Splunk Search

Earliest entry for each host

pitmod
Explorer

Hello,

In my lookup I have the following data:

_time='2020-10-21 15:00' usage='1' host='A'
_time='2020-10-26 15:00' usage='2' host='B'
_time='2020-10-21 16:00' usage='3' host='A'
_time='2020-10-23 18:00' usage='4' host='A'
_time='2020-10-24 15:00' usage='2' host='B'


I want to get only the earliest entry for each host so it will look like this:


host='A' _time='2020-10-21 15:00' usage='1'
host='B' _time='2020-10-24 15:00' usage='2'

How can I do it?

Labels (2)
0 Karma
1 Solution

thambisetty
SplunkTrust
SplunkTrust

| stats earliest(_time) as _time earliest(usage) as usage by host

————————————
If this helps, give a like below.

View solution in original post

thambisetty
SplunkTrust
SplunkTrust

| stats earliest(_time) as _time earliest(usage) as usage by host

————————————
If this helps, give a like below.
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...