Splunk Search

I have a need to count the number of events ingested for 2024.

paulcurry
Path Finder

I would like to get a count of events of all data ingested for 2024.  I have hundreds of indexes and all data over 90 days goes to DDAA.  I can use "eventcounts" for the searchable data and just multiply by 4 for an estimate.  

Using: 

| eventcount summarize=false index=*
| stats sum(count) as total_events by index
| fieldformat total_events=tostring(total_events,"commas")
| addcoltotals

 

Is there a way to get eventcounts for archived data?

Labels (1)
Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Archived data must be restored before it can be searched.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

paulcurry
Path Finder

That's what I thought.  Thank you for confirming.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Archived data must be restored before it can be searched.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Fueling your curiosity with new Splunk ILT and eLearning courses

At Splunk Education, we’re driven by curiosity—both ours and yours! That’s why we’re committed to delivering ...

Splunk AI Assistant for SPL 1.1.0 | Now Personalized to Your Environment for Greater ...

Splunk AI Assistant for SPL has transformed how users interact with Splunk, making it easier than ever to ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureOn Demand Now Step boldly into the AI revolution with enhanced security ...