Splunk Search

Using latest= in search results in all time, not today

kmattern
Builder

alt textI have this very simple search

sourcetype=iis latest=+6h

When I select Today from the date/time picker and run the search it returns results for all time. My iis logs are UTC but are converted to Central time by Splunk. I need the 6 hour offset to get the times to match existing non Splunk reports.

As can be seen in the screen shot the search continued to a point much earliern than midnight today, November 16. Seeing this happen is very scary because it throws into doubt many of my production dashboard results. Does anyone have any ideas?

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

When you put "latest" in your search, it trumps the selection in the date/time picker. The workaround is to also include "earliest" in your search string.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

When you put "latest" in your search, it trumps the selection in the date/time picker. The workaround is to also include "earliest" in your search string.

---
If this reply helps you, Karma would be appreciated.

kmattern
Builder

Doh! I shold have known that. It's been a long year.

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...