Security

How do I find the first firewall entry?

nick598660
New Member

Hello Everyone,

I need some help figuring out how far back my firewall logs go. If I set the time picker to "All Time", and just search for Cisco ASA, I get 20 pages of events from today.

Any ideas on how I can locate when I first started getting logs into Splunk from my firewall?

Tags (2)
0 Karma
1 Solution

whrg
Motivator

Hello @nick598660,

You can use the metadata command to list the timestamps of the first event and of last the event for a list of sourcetypes/hosts/sources.

Try something like this:

| metadata type=sourcetypes index=YOURINDEX
| rename firstTime as "First Event" lastTime as "Last Event" recentTime as "Last Update"
| fieldformat "First Event"=strftime('First Event', "%c") | fieldformat "Last Event"=strftime('Last Event', "%c") | fieldformat "Last Update"=strftime('Last Update', "%c")

The web page under Settings / Indexes also lists the earliest event and the latest event for each index.

If the log volume is not too big, then you could also run a simple tail command to retrieve the first event. Set the time picker to "All Time":

index=YOURINDEX sourcetype=YOURSOURCETYPE | tail 1

View solution in original post

0 Karma

whrg
Motivator

Hello @nick598660,

You can use the metadata command to list the timestamps of the first event and of last the event for a list of sourcetypes/hosts/sources.

Try something like this:

| metadata type=sourcetypes index=YOURINDEX
| rename firstTime as "First Event" lastTime as "Last Event" recentTime as "Last Update"
| fieldformat "First Event"=strftime('First Event', "%c") | fieldformat "Last Event"=strftime('Last Event', "%c") | fieldformat "Last Update"=strftime('Last Update', "%c")

The web page under Settings / Indexes also lists the earliest event and the latest event for each index.

If the log volume is not too big, then you could also run a simple tail command to retrieve the first event. Set the time picker to "All Time":

index=YOURINDEX sourcetype=YOURSOURCETYPE | tail 1
0 Karma

nick598660
New Member

That is exactly what I was looking for. Thank You!

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...