Splunk Search

How can I find the data retention and indexers involved?

danielbb
Motivator

I need a query that will provide the earliest date for data within an index as well as the indexer it is stored on, specifically looking for which indexes are storing data for one year or more and on which indexers they are being stored on.

Any ideas?

Labels (1)
Tags (1)
0 Karma

SinghK
Builder

Data retention can also be checked from indexes.conf thuogh you will have to convert time.

isoutamo
SplunkTrust
SplunkTrust

That told what has defined, but it didn't told you what is current situation on your environment. There could be e.g. too less space for fulfil those definitions and/or some events could be there much longer as buckets contains newer events etc.

Here is some older post which explain this behabiour

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

You probably have MC installed, configured and in use in your environment? If not then you should take it into use!

You can see (almost) this from MC -> Indexing -> Indexes and Volumes: Deployment.

If that report is not exactly what you are looking for you could open it's search (by right hand side lower corner) and update that search to fulfil your needs.

r. Ismo

Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...