Splunk Search

How can I find the data retention and indexers involved?

danielbb
Motivator

I need a query that will provide the earliest date for data within an index as well as the indexer it is stored on, specifically looking for which indexes are storing data for one year or more and on which indexers they are being stored on.

Any ideas?

Labels (1)
Tags (1)
0 Karma

SinghK
Builder

Data retention can also be checked from indexes.conf thuogh you will have to convert time.

isoutamo
SplunkTrust
SplunkTrust

That told what has defined, but it didn't told you what is current situation on your environment. There could be e.g. too less space for fulfil those definitions and/or some events could be there much longer as buckets contains newer events etc.

Here is some older post which explain this behabiour

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

You probably have MC installed, configured and in use in your environment? If not then you should take it into use!

You can see (almost) this from MC -> Indexing -> Indexes and Volumes: Deployment.

If that report is not exactly what you are looking for you could open it's search (by right hand side lower corner) and update that search to fulfil your needs.

r. Ismo

Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...