Splunk Search

How to find the oldest timestamp of an event available for search

jayakumar89
Explorer

I would like to find the oldest timestamp of events available for search (with respect to sourcetype) in an index. Metadata shows the oldest timestamp when data was indexed, but the actual data might have rolled off because of retention policies. Appreciate your help!

Tags (2)
0 Karma
1 Solution

tiagofbmm
Influencer

Data timestamp does not change when data is rolled from hot to warm or warm to cold. So the earliest event can be found by

| tstats earliest(_time) where index = yourindex

View solution in original post

tiagofbmm
Influencer

Data timestamp does not change when data is rolled from hot to warm or warm to cold. So the earliest event can be found by

| tstats earliest(_time) where index = yourindex

tiagofbmm
Influencer

Please let me know if the answer was useful for you. If it was, accept it and upvote. If not, give us more input so we can help you with that

0 Karma

jayakumar89
Explorer

@tiagofbmm, it really helped. Forgot to update. Thanks For your response!

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...