Splunk Search

How to find the oldest timestamp of an event available for search

jayakumar89
Explorer

I would like to find the oldest timestamp of events available for search (with respect to sourcetype) in an index. Metadata shows the oldest timestamp when data was indexed, but the actual data might have rolled off because of retention policies. Appreciate your help!

Tags (2)
0 Karma
1 Solution

tiagofbmm
Influencer

Data timestamp does not change when data is rolled from hot to warm or warm to cold. So the earliest event can be found by

| tstats earliest(_time) where index = yourindex

View solution in original post

tiagofbmm
Influencer

Data timestamp does not change when data is rolled from hot to warm or warm to cold. So the earliest event can be found by

| tstats earliest(_time) where index = yourindex

tiagofbmm
Influencer

Please let me know if the answer was useful for you. If it was, accept it and upvote. If not, give us more input so we can help you with that

0 Karma

jayakumar89
Explorer

@tiagofbmm, it really helped. Forgot to update. Thanks For your response!

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...

Updated Data Management and AWS GDI Inventory in Splunk Observability

We’re making some changes to Data Management and Infrastructure Inventory for AWS. The Data Management page, ...