Splunk Search

How to get the last hour of events but also remove any data after last hour

michael_wong
Path Finder
Deleted
Labels (1)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

Set the time picker to Advanced and set the earliest/latest as needed -4h@h and @h

View solution in original post

0 Karma

bowesmana
SplunkTrust
SplunkTrust

You can control the time window of your search, e.g. if you set the earliest to be -4h@h and the latest to be @h , e.g.

earliest=-4h@h latest=@h

then you will get the previous 4 hours up to the last completed hour

 

0 Karma

michael_wong
Path Finder

Thanks for your help. But I need to use it in tstats command, and it will give error "'tstats' command: Invalid argument: 'earliest=-4h@h'"  Do you know any other way. Better it can use in time picker as well.

0 Karma

bowesmana
SplunkTrust
SplunkTrust

Set the time picker to Advanced and set the earliest/latest as needed -4h@h and @h

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...