Splunk Search

How to find the oldest timestamp of an event available for search

jayakumar89
Explorer

I would like to find the oldest timestamp of events available for search (with respect to sourcetype) in an index. Metadata shows the oldest timestamp when data was indexed, but the actual data might have rolled off because of retention policies. Appreciate your help!

Tags (2)
0 Karma
1 Solution

tiagofbmm
Influencer

Data timestamp does not change when data is rolled from hot to warm or warm to cold. So the earliest event can be found by

| tstats earliest(_time) where index = yourindex

View solution in original post

tiagofbmm
Influencer

Data timestamp does not change when data is rolled from hot to warm or warm to cold. So the earliest event can be found by

| tstats earliest(_time) where index = yourindex

tiagofbmm
Influencer

Please let me know if the answer was useful for you. If it was, accept it and upvote. If not, give us more input so we can help you with that

0 Karma

jayakumar89
Explorer

@tiagofbmm, it really helped. Forgot to update. Thanks For your response!

0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...