Splunk Search

First & Last Occurrence of a Field

colinmchugo
Explorer

Hi,

Is there a way of discovering when an a field (e.g. like an IP address or MAC address) was first seen in the index? So i can pull out the data for the last time it was seen (which would be the default) but id also like to see when this was first seen and pull the time stamp and other data if possible?

thanks in advance

C.

0 Karma

rjthibod
Champion

If you want the most accurate (in terms of timestamp, not indexing-time), then you should use min(_time). For example, use this query where you swap out the values for your base search and field name.

<YOUR_BASE_SEARCH> <YOUR_FIELD>=* | stats min(_time) as earliest by <YOUR_FIELD>

A faster way that relies on indexing-time, not the raw timestamp, is using earliest(_time).

<YOUR_BASE_SEARCH> <YOUR_FIELD>=* | stats earliest(_time) as earliest by <YOUR_FIELD>

Usually these two will return the same values, but that is not guaranteed, e.g., events get stuck in a queue and get indexed some time later.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...