Getting Data In

Get list of active indexes that are ingesting logs

koyachi
Explorer

Hello,

We have a splunk instance where we have configured security related logs. There are hundreds of indexes created on the instance and now we are planning to disable indexes that are no longer active.

These security logs are now either going to Azure or they are no longer needed so they were stopped by the stakeholders. I am looking for a query that can give me the list of indexes with the most recent event timestamp in respective indexes.

with this details plan is to look for the indexes that have event older than 1 month and consider them as migrated/no longer needed.

Labels (2)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @koyachi,

you could run something like this:

| tstats count latest(_time) AS latest WHERE index=* BY index
| eval latest=strftime(latest,"%Y-%m-%d %H:%M:%S")

Ciao.

Giuseppe

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| metasearch index=*
| stats latest(_time) as _time by index

gcusello
SplunkTrust
SplunkTrust

Hi @koyachi,

you could run something like this:

| tstats count latest(_time) AS latest WHERE index=* BY index
| eval latest=strftime(latest,"%Y-%m-%d %H:%M:%S")

Ciao.

Giuseppe

koyachi
Explorer

Thanks @gcusello . This gives me the info what i need.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @koyachi ,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated by all the contributors 😉

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...