Splunk Search

How to search only sourcetypes that began ingestion in last 7 days

sdewar83
Path Finder

Hi,

I'm very much a Splunk novice, but I've been playing around with trying to do some health checks for Splunk so when we configure new forwarders etc we can tell whether the sourcetype is being ingested.

I had the date picker on 7 days came up with:

|metadata type=sourcetypes | convert ctime(firstTime) | Fields - type, totalCount, recentTime, lastTime

This seems to give me the first time within the last 7 days that all sourcetypes were ingested.

I was hoping someone could help me with the logic to make this only show sourcetypes whose first began ingesting in the last 7 days?

Cheers

0 Karma

renjith_nair
Legend

@sdewar83 ,

Try

| metadata type=sourcetypes  where firstTime>=relative_time(now(),"-7d@d")
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

sdewar83
Path Finder

This certainly gives me a result ... but it still gives me results of other sourcetypes whose first time wasn't less than 7 days ago? I would've thought that it'd return nothing, unless i'd introduced a new sourcetype in the last 7 days, if that makes sense.

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...