Splunk Search

How to add time parameter in query

tkadale
Path Finder

How to search something for specific time period. For example I want to show Max CPU usage for each host for Last 24 hours. And want to do it through query and don't want to use TimeRangePicker. Can anybody Help??

Thanks in Advance!

Tags (1)
0 Karma

Ant1D
Motivator

You should be able to this. Here's an example:

index=myindex earliest=-24h

This will return all events in the index named myindex in the last 24 hours. You just need to add the parameter earliest=some_time_period as shown above

0 Karma

fox
Path Finder

search earliest=-24h should do the trick - there is good documentation on this and other time commands in the search pdf file downloadable from the splunk website.

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...