Splunk Search

How to find the oldest timestamp of an event available for search

jayakumar89
Explorer

I would like to find the oldest timestamp of events available for search (with respect to sourcetype) in an index. Metadata shows the oldest timestamp when data was indexed, but the actual data might have rolled off because of retention policies. Appreciate your help!

Tags (2)
0 Karma
1 Solution

tiagofbmm
Influencer

Data timestamp does not change when data is rolled from hot to warm or warm to cold. So the earliest event can be found by

| tstats earliest(_time) where index = yourindex

View solution in original post

tiagofbmm
Influencer

Data timestamp does not change when data is rolled from hot to warm or warm to cold. So the earliest event can be found by

| tstats earliest(_time) where index = yourindex

tiagofbmm
Influencer

Please let me know if the answer was useful for you. If it was, accept it and upvote. If not, give us more input so we can help you with that

0 Karma

jayakumar89
Explorer

@tiagofbmm, it really helped. Forgot to update. Thanks For your response!

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...