Splunk Search

Finding the earliest event matching a query

flaviadonno
Explorer

Hi all,
is there a quick way to find the earliest event (given the logtype and the index) matching a query ?

Tags (2)

lguinn2
Legend

Or, if you are looking for a more generic solution:

yoursearchhere
| tail 1

Why tail and not head? Because Splunk returns the search results sorted so that the latest result comes first. So the last result will be the earliest.

Other variations are possible. For example, if I want to see the earliest time that each clientip address appeared in the results, along with the count:

yoursearchhere
| stats earliest(_time) as FirstAppearance count by clientip
| fieldformat FirstAppearance=strftime(FirstAppearance,"%x %X")

flaviadonno
Explorer

Cool! Thank you!

0 Karma

kristian_kolb
Ultra Champion

If you by 'logtype' mean sourcetype;

| metadata type=sourcetypes index=your_indexname_here | convert ctime(firstTime) | fields - lastTime, recentTime, type

and yes, the search starts with a pipe (|)

/K

Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...