I was wondering whether Splunk supports earliest and latest date in Metadata, metasearch, and tstats command?
I tried to check all the sites but couldn't find it.
How to use multiple metadata OR metasearch OR tstats command in a single search with different time ranges?
Could anyone please help me on this?
The regular search, tstats search and metasearch uses time range so they support earliest and latest, either though time range picker or inline in the search.
The metadata command on other hand, uses time range picker for time ranges but there is a glitch. It doesn't limit the metadata counts by just the events included in time range, rather it give results based on buckets included in give time range, so it's highly inaccurate for time ranges other than All times. See this documentation section for great explanation for the same.
http://docs.splunk.com/Documentation/Splunk/7.1.0/SearchReference/Metadata#Time_ranges
Thanks SomeSoni for your suggestion
But I was looking to append two metadata command with same search pattern but different time range as first search will be 48 hours ago and another will be 24 hours ago.
Something like this
|metadata type=sourcetypes earliest=-48h latest=-24h |append[|metadata type=sourcetypes earliest=-24h latest=-0h]
If you can help me on this that would be grateful.
Use the tstats for that, as I (and that link) indicate that counts will be accurate for time ranges other than All Times.
| tstats count as totalEvents max(_time) as lastTime min(_time) as firstTime WHERE index=* earliest=-48h latest=-24h by sourcetype
| append [| tstats count as totalEvents max(_time) as lastTime min(_time) as firstTime WHERE index=* earliest=-24h latest=-0h by sourcetype ]