Splunk Search

Oldest and Latest Logs per Index

ssingh5
Path Finder

I would like to see the list of all the Indexes along with the Earliest and Latest Time stamp for the most oldest log and most earliest log stored in that index.

I used following qeuery but i take to much time to provide the resluts, is their any other method to see this information as quick as possible.

index=* | stats first(_time) as latest last(_time) as earliest by index | convert timeformat="%Y-%m-%d %H:%M:%S" ctime(earliest) ctime(latest)

Tags (1)
0 Karma

kristian_kolb
Ultra Champion

You could probably find a metadata search to do what you want:

| metadata type=sourcetypes index=main| stats min(firstTime) AS begin max(lastTime) AS end  | eval begin = strftime(begin, "%Y-%m-%d %H:%M:%S") | eval end = strftime(end, "%Y-%m-%d %H:%M:%S")  

For more information, see http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Metadata

Hope this helps,

Kristian

Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...