Splunk Search

Setting 'earliest' in a splunk query

harihara
Observer

index =prd-Thailand sourcetype=abc-app-log earliest=-75m@m latest=now

|table a, b,c ,d ,e, f
|where a=1324 b=345
|stats count as volume

Question is how to replace earliest=-1440m@m

Please let me know if any more details required

Labels (1)
0 Karma

harihara
Observer

It is a dasboard query which is used linked other queries as well

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Please provide further detail of what you have and what you are trying to achieve

livehybrid
SplunkTrust
SplunkTrust

Hi @harihara 

If you want to search back the last 24 hours then you can just replace the existing "-75m@m" with "-1440m@m", or "-1d" for the last 24 hours from now, or "-1d@m" which is the same as 1440 but just easier to read.

Are you having any issues when trying to replace the -75m@m  with "-1440m@m"?

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma
Get Updates on the Splunk Community!

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

 Ready to master Kubernetes and cloud monitoring like the pros? Join Splunk’s Growth Engineering team for an ...

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...