Splunk Search

Setting 'earliest' in a splunk query

harihara
Observer

index =prd-Thailand sourcetype=abc-app-log earliest=-75m@m latest=now

|table a, b,c ,d ,e, f
|where a=1324 b=345
|stats count as volume

Question is how to replace earliest=-1440m@m

Please let me know if any more details required

Labels (1)
0 Karma

harihara
Observer

It is a dasboard query which is used linked other queries as well

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Please provide further detail of what you have and what you are trying to achieve

livehybrid
SplunkTrust
SplunkTrust

Hi @harihara 

If you want to search back the last 24 hours then you can just replace the existing "-75m@m" with "-1440m@m", or "-1d" for the last 24 hours from now, or "-1d@m" which is the same as 1440 but just easier to read.

Are you having any issues when trying to replace the -75m@m  with "-1440m@m"?

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...