Splunk Search

I have a need to count the number of events ingested for 2024.

paulcurry
Path Finder

I would like to get a count of events of all data ingested for 2024.  I have hundreds of indexes and all data over 90 days goes to DDAA.  I can use "eventcounts" for the searchable data and just multiply by 4 for an estimate.  

Using: 

| eventcount summarize=false index=*
| stats sum(count) as total_events by index
| fieldformat total_events=tostring(total_events,"commas")
| addcoltotals

 

Is there a way to get eventcounts for archived data?

Labels (1)
Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Archived data must be restored before it can be searched.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

paulcurry
Path Finder

That's what I thought.  Thank you for confirming.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Archived data must be restored before it can be searched.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...