Splunk Search

How to Search to show any new logs/indexes added to the environment within a period of time?

wgph96
Engager

I am creating a dashboard to show any new logs that are added to our environment within a period of time.

For example - if we started ingesting AWS logs and Azure logs 2 days ago is there a way I can create a dashboard that shows these 2 new ingestions? 

I am having trouble making a search query that can display a new value with the name of the recently added index added to the environment. Does anyone have any suggestions on how to solve this? Thanks.

Labels (1)
0 Karma
1 Solution

somesoni2
Revered Legend

Give this a try. Use a larger time-range (e.g. last 7 days) and adjust filter as necessary. Current example searches for new data that was added within last 2 days (searching data for last 7 days).

|  tstats min(_indextime) as IngestTime WHERE index=* OR index=_* earliest=-7d by index sourcetype 
|  convert ctime(IngestTime) as IngestTimeHuman 
|  where IngestTime> relative_time(now(),"-24h")

View solution in original post

0 Karma

somesoni2
Revered Legend

Give this a try. Use a larger time-range (e.g. last 7 days) and adjust filter as necessary. Current example searches for new data that was added within last 2 days (searching data for last 7 days).

|  tstats min(_indextime) as IngestTime WHERE index=* OR index=_* earliest=-7d by index sourcetype 
|  convert ctime(IngestTime) as IngestTimeHuman 
|  where IngestTime> relative_time(now(),"-24h")
0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...