Getting Data In

Can you help us build a query to check the time of the earliest event in an index?

Arpit_S
Path Finder

Hi,

In our instance, we have indexes that have current sizes that are more than the maximum size of the index. We just wanted to create and alert to monitor if an index has data older than the specified retention period. For example, if an index has a retention period of 90 days, it ideally should not have data for the 91st day.

Thanks.

Tags (1)
0 Karma
1 Solution

HiroshiSatoh
Champion

How's this?

| tstats earliest(_time) as firstTime WHERE index=(your index)

View solution in original post

HiroshiSatoh
Champion

How's this?

| tstats earliest(_time) as firstTime WHERE index=(your index)

Get Updates on the Splunk Community!

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...

Updated Data Management and AWS GDI Inventory in Splunk Observability

We’re making some changes to Data Management and Infrastructure Inventory for AWS. The Data Management page, ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...