Splunk Search

How come the output of our tstats command is not getting written to a CSV?

Arpit_S
Path Finder

Hi,

I am trying to create a lookup that has the names of all the indexes and the timestamp of the oldest event in that index.

I am running the below search for this:

|tstats earliest(_time) as oldestEvent by index | outputlookup abcd.csv

I ran this search for almost 3 hours, and even then, the search wasn't complete. Though, when hovering over the progress bar, I was able to see that the search had scanned 100% of the events, but there were no results in the CSV.

Can someone help me with this.

Regards,
Arpit

Tags (2)
0 Karma

p_gurav
Champion

Try this:

| metasearch index=* | stats earliest(_time) as earliest_time by index

0 Karma

Arpit_S
Path Finder

This search is also taking forever to run.

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@Arpit_S

Have you tried rest command??

| rest /services/data/indexes 

Can you please confirm it's working for you?

| rest /services/data/indexes | table title minTime | rename minTime as oldestEvent, title as index | outputlookup abcd.csv

Thanks

0 Karma

Arpit_S
Path Finder

@kamlesh_vaghela I am able to run "| rest /services/data/indexes " but there is no value under minTime field for me.

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@Arpit_S

Did you get minTime field blank for all the indexes??

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...