what command can i run if am not sure where an index for a data associated with a sourcetype is stored in splunk
you could try:
index=*
| stats values(sourcetype) as sourcetype by index
| table index, sourcetype
this will provide all sourcetypes associated to their index, based on the timeframe given and if they contain event logs during that time frame.
Hi @whitecat001,
you could try:
index=* sourcetype=your_sourcetype
in this way you can know which is the index.
Ciao.
Giuseppe
thank you
| tstats count where index=* by index, sourcetype