Splunk Search

Oldest and Latest Logs per Index

ssingh5
Path Finder

I would like to see the list of all the Indexes along with the Earliest and Latest Time stamp for the most oldest log and most earliest log stored in that index.

I used following qeuery but i take to much time to provide the resluts, is their any other method to see this information as quick as possible.

index=* | stats first(_time) as latest last(_time) as earliest by index | convert timeformat="%Y-%m-%d %H:%M:%S" ctime(earliest) ctime(latest)

Tags (1)
0 Karma

kristian_kolb
Ultra Champion

You could probably find a metadata search to do what you want:

| metadata type=sourcetypes index=main| stats min(firstTime) AS begin max(lastTime) AS end  | eval begin = strftime(begin, "%Y-%m-%d %H:%M:%S") | eval end = strftime(end, "%Y-%m-%d %H:%M:%S")  

For more information, see http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Metadata

Hope this helps,

Kristian

Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...