Splunk Search

How to filter the events

gladiatorankit
Explorer

When input a value in a search box it shows all the events and all the values are displayed which are not in the file anymore. How to restrict events to show the latest results in a txt file? Or should I reindex the file?

Tags (1)
0 Karma
1 Solution

yannK
Splunk Employee
Splunk Employee

"which are not in the file anymore"
Yes, this is what Splunk is about, a timebase search tool for events with a timestamp.
It doesn't know anything about what is in the log file now.
If you want to see the latest values, restrict the search time range.

if your log file is always the same format with fields (like a configuration file), and is erased and replaced by the new version, you could use the "dedup" command to retrieve the latest values for a given field.

View solution in original post

yannK
Splunk Employee
Splunk Employee

"which are not in the file anymore"
Yes, this is what Splunk is about, a timebase search tool for events with a timestamp.
It doesn't know anything about what is in the log file now.
If you want to see the latest values, restrict the search time range.

if your log file is always the same format with fields (like a configuration file), and is erased and replaced by the new version, you could use the "dedup" command to retrieve the latest values for a given field.

gladiatorankit
Explorer

Thanks alot for sharing the right command.

0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...