Splunk Search

How to use index time to search the data to avoid skipped searches etc?

mohammadsharukh
Path Finder

Dear All,

 

I was going through a Splunk conf 21 where the narrator explained to use the index time instead of search time using a Macro

Out of curiosity, I went to understand the query and have the following doubts:-

1) In row 5 of the query, What is "default start lookback" & "longest lookback" and from where they getting the value?

2) In row 6 of the query, What is "realtime lag" &" longest query" and from where they getting the value?

3) What is the concept of row 8? how the search is working?

4) What does row 14 mean? what is 1=2?

Please find below the splunk query

mohammadsharukh_0-1693116170225.png

 

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

All of the variables surrounded by '$' (like $overlap$) are tokens.  Tokens are set in the <input> section of a dashboard or are the results of other dashboard panels.  They also can be passed in from another dashboard.  Perhaps an earlier part of the talk describes this.

Line 8 is not performing a search - it's just building a search string using a combination of string literals and fields connected with the concatenation (.) operator.

Line 14 only passes events where 1=2, which is a way of ensuring the subsearch returns no results.  IOW, it makes the outputlookup command silent.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

All of the variables surrounded by '$' (like $overlap$) are tokens.  Tokens are set in the <input> section of a dashboard or are the results of other dashboard panels.  They also can be passed in from another dashboard.  Perhaps an earlier part of the talk describes this.

Line 8 is not performing a search - it's just building a search string using a combination of string literals and fields connected with the concatenation (.) operator.

Line 14 only passes events where 1=2, which is a way of ensuring the subsearch returns no results.  IOW, it makes the outputlookup command silent.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...