Splunk Search

Want to understand below condition in Query


Can anyone help me to understand below condition

where _time>=if("$field1.earliest$"=="0",1,relative_time(now(),"$field1.earliest$")) AND _time<=case("$field1.latest$"=="",relative_time(now(),"-1m"),"$field1.latest$"=="now",now(),true(),relative_time(now(),"$field1.latest$"))

field1 is the time token here

Tags (1)
0 Karma

Esteemed Legend

I assume that your events are coming in from something other than a normal search (e.g. dbxquery or inputlookup) and you need to do the time filtering yourself. It is just doing the normal Time Picker time/date filtering.

0 Karma
Get Updates on the Splunk Community!

Announcing General Availability of Splunk Incident Intelligence!

Digital transformation is real! Across industries, companies big and small are going through rapid digital ...

Splunk Training for All: Meet Aspiring Cybersecurity Analyst, Marc Alicea

Splunk Education believes in the value of training and certification in today’s rapidly-changing data-driven ...

The Splunk Success Framework: Your Guide to Successful Splunk Implementations

Splunk Lantern is a customer success center that provides advice from Splunk experts on valuable data ...