Getting Data In

Can you help us build a query to check the time of the earliest event in an index?

Arpit_S
Path Finder

Hi,

In our instance, we have indexes that have current sizes that are more than the maximum size of the index. We just wanted to create and alert to monitor if an index has data older than the specified retention period. For example, if an index has a retention period of 90 days, it ideally should not have data for the 91st day.

Thanks.

Tags (1)
0 Karma
1 Solution

HiroshiSatoh
Champion

How's this?

| tstats earliest(_time) as firstTime WHERE index=(your index)

View solution in original post

HiroshiSatoh
Champion

How's this?

| tstats earliest(_time) as firstTime WHERE index=(your index)

Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...