Dashboards & Visualizations

Display Minimum and Maximum values in a Column

NeonFlash
Explorer

I am querying a sourcetype which has a field called _time that displays the timestamp of the event. The format of this field is: 1/9/13 10:10:53.000 AM

Now, I want to display the minimum and maximum timestamps in the entire column.

I tried using the min and max functions however it does not give any output.

table min(_time), max(_time)

This way I would get the first instance and the last instance of the event from the logs.

I even tried to use the eval function as follows:

table eval(min(_time)), eval(max(_time))

Tags (3)

Suda
Communicator

I recommend you to use the following search commans after your searches.

(your search) 
| stats max(_time) AS max min(_time) AS min 
| eval max=strftime(max, "%Y/%m/%d %T.%3Q") 
| eval min=strftime(min, "%Y/%m/%d %T.%3Q")
| table min max

Thanks.

yannK
Splunk Employee
Splunk Employee

use stats, not table.

sdaniels
Splunk Employee
Splunk Employee

I think you may be looking for the commands head and tail.

| head 1 will give you the latest event and tail will give you the earliest for your specified time range.

http://docs.splunk.com/Documentation/Splunk/latest/SearchReference/head
http://docs.splunk.com/Documentation/Splunk/5.0.1/SearchReference/Tail

Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...