Splunk Search

Want to understand below condition in Query


Can anyone help me to understand below condition

where _time>=if("$field1.earliest$"=="0",1,relative_time(now(),"$field1.earliest$")) AND _time<=case("$field1.latest$"=="",relative_time(now(),"-1m"),"$field1.latest$"=="now",now(),true(),relative_time(now(),"$field1.latest$"))

field1 is the time token here

Tags (1)
0 Karma

Esteemed Legend

I assume that your events are coming in from something other than a normal search (e.g. dbxquery or inputlookup) and you need to do the time filtering yourself. It is just doing the normal Time Picker time/date filtering.

0 Karma
Get Updates on the Splunk Community!

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...

Using Machine Learning for Hunting Security Threats

WATCH NOW Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for ...