Splunk Search

Using latest= in search results in all time, not today

kmattern
Builder

alt textI have this very simple search

sourcetype=iis latest=+6h

When I select Today from the date/time picker and run the search it returns results for all time. My iis logs are UTC but are converted to Central time by Splunk. I need the 6 hour offset to get the times to match existing non Splunk reports.

As can be seen in the screen shot the search continued to a point much earliern than midnight today, November 16. Seeing this happen is very scary because it throws into doubt many of my production dashboard results. Does anyone have any ideas?

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

When you put "latest" in your search, it trumps the selection in the date/time picker. The workaround is to also include "earliest" in your search string.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

When you put "latest" in your search, it trumps the selection in the date/time picker. The workaround is to also include "earliest" in your search string.

---
If this reply helps you, Karma would be appreciated.

kmattern
Builder

Doh! I shold have known that. It's been a long year.

0 Karma
Get Updates on the Splunk Community!

Exporting Splunk Apps

Join us on Monday, October 21 at 11 am PT | 2 pm ET!With the app export functionality, app developers and ...

Cisco Use Cases, ITSI Best Practices, and More New Articles from Splunk Lantern

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Build Your First SPL2 App!

Watch the recording now!.Do you want to SPL™, too? SPL2, Splunk's next-generation data search and preparation ...