Splunk Search

Want to understand below condition in Query


Can anyone help me to understand below condition

where _time>=if("$field1.earliest$"=="0",1,relative_time(now(),"$field1.earliest$")) AND _time<=case("$field1.latest$"=="",relative_time(now(),"-1m"),"$field1.latest$"=="now",now(),true(),relative_time(now(),"$field1.latest$"))

field1 is the time token here

Tags (1)
0 Karma

Esteemed Legend

I assume that your events are coming in from something other than a normal search (e.g. dbxquery or inputlookup) and you need to do the time filtering yourself. It is just doing the normal Time Picker time/date filtering.

0 Karma
Get Updates on the Splunk Community!

Splunk Security Content for Threat Detection & Response, Q1 Roundup

Join Principal Threat Researcher, Michael Haag, as he walks through:An introduction to the Splunk Threat ...

Splunk Life | Happy Pride Month!

Happy Pride Month, Splunk Community! &#x1f308; In the United States, as well as many countries around the ...

SplunkTrust | Where Are They Now - Michael Uschmann

The Background Five years ago, Splunk published several videos showcasing members of the SplunkTrust to share ...