Splunk Search

Oldest and Latest Logs per Index

ssingh5
Path Finder

I would like to see the list of all the Indexes along with the Earliest and Latest Time stamp for the most oldest log and most earliest log stored in that index.

I used following qeuery but i take to much time to provide the resluts, is their any other method to see this information as quick as possible.

index=* | stats first(_time) as latest last(_time) as earliest by index | convert timeformat="%Y-%m-%d %H:%M:%S" ctime(earliest) ctime(latest)

Tags (1)
0 Karma

kristian_kolb
Ultra Champion

You could probably find a metadata search to do what you want:

| metadata type=sourcetypes index=main| stats min(firstTime) AS begin max(lastTime) AS end  | eval begin = strftime(begin, "%Y-%m-%d %H:%M:%S") | eval end = strftime(end, "%Y-%m-%d %H:%M:%S")  

For more information, see http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Metadata

Hope this helps,

Kristian

Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...