Splunk Search

I have a need to count the number of events ingested for 2024.

paulcurry
Path Finder

I would like to get a count of events of all data ingested for 2024.  I have hundreds of indexes and all data over 90 days goes to DDAA.  I can use "eventcounts" for the searchable data and just multiply by 4 for an estimate.  

Using: 

| eventcount summarize=false index=*
| stats sum(count) as total_events by index
| fieldformat total_events=tostring(total_events,"commas")
| addcoltotals

 

Is there a way to get eventcounts for archived data?

Labels (1)
Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Archived data must be restored before it can be searched.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

paulcurry
Path Finder

That's what I thought.  Thank you for confirming.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Archived data must be restored before it can be searched.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...