Getting Data In

Can you help us build a query to check the time of the earliest event in an index?

Arpit_S
Path Finder

Hi,

In our instance, we have indexes that have current sizes that are more than the maximum size of the index. We just wanted to create and alert to monitor if an index has data older than the specified retention period. For example, if an index has a retention period of 90 days, it ideally should not have data for the 91st day.

Thanks.

Tags (1)
0 Karma
1 Solution

HiroshiSatoh
Champion

How's this?

| tstats earliest(_time) as firstTime WHERE index=(your index)

View solution in original post

HiroshiSatoh
Champion

How's this?

| tstats earliest(_time) as firstTime WHERE index=(your index)

Get Updates on the Splunk Community!

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Community Content Calendar, October Edition

Welcome to the October edition of our Community Spotlight! The Splunk Community is a treasure trove of ...

SOC4Kafka - New Kafka Connector Powered by OpenTelemetry

The new SOC4Kafka connector, built on OpenTelemetry, enables the collection of Kafka messages and forwards ...