Splunk Search

Using latest timestamp in another search

krylov
Explorer

Good afternoon!

I need to do the following:
1. Using a search result that finds the last timestamp in a certain time interval, add it to another search № 2
index=status beamID=1 | stats latest(statustime)
2. Real-time search:
index = status beamID=1 time = "result of search №1" |
stats count(eval(terminalStatus="normal")) as NORMAL count(eval(terminalStatus="critical")) as CRITICAL count(eval(terminalStatus="pending-registration")) as PENDING-REGISTRATION count(eval(terminalStatus="unknown")) as UNKNOWN count(eval(terminalStatus="minor")) as MINOR count(eval(terminalStatus="major")) as MAJOR count(eval(terminalStatus="activationFailed")) as ACTIVATIONFAILED by beamID

Is it possible to do this?
Thanks in advance!

Tags (2)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Use a subsearch.

index = status beamID=1 time = [ index=status beamID=1 | stats latest(statustime) as latest | return $latest ] |
stats count(eval(terminalStatus="normal")) as NORMAL count(eval(terminalStatus="critical")) as CRITICAL count(eval(terminalStatus="pending-registration")) as PENDING-REGISTRATION count(eval(terminalStatus="unknown")) as UNKNOWN count(eval(terminalStatus="minor")) as MINOR count(eval(terminalStatus="major")) as MAJOR count(eval(terminalStatus="activationFailed")) as ACTIVATIONFAILED by beamID
---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Use a subsearch.

index = status beamID=1 time = [ index=status beamID=1 | stats latest(statustime) as latest | return $latest ] |
stats count(eval(terminalStatus="normal")) as NORMAL count(eval(terminalStatus="critical")) as CRITICAL count(eval(terminalStatus="pending-registration")) as PENDING-REGISTRATION count(eval(terminalStatus="unknown")) as UNKNOWN count(eval(terminalStatus="minor")) as MINOR count(eval(terminalStatus="major")) as MAJOR count(eval(terminalStatus="activationFailed")) as ACTIVATIONFAILED by beamID
---
If this reply helps you, Karma would be appreciated.
0 Karma

krylov
Explorer

Thanks! It really works.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

@krylov If your problem is resolved, please accept the answer to help future readers.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...