If i only want to use the field "_time" of a log to get first and latest occurrence of an event, which commands should i use and why ?
ex:
...
| stats earliest(_time) as firsttime latest(_time) as lasttime
...
or
...
| stats min(_time) as firsttime max(_time) as lasttime
...
Is there a case where i could get differents results ?
what does Splunk recommend ?
Hi @jordan_art,
there isn't a best practice, you can use both of them with the same results.
Ciao.
Giuseppe
Hi @edefIo1937,
_time is a timestamp in epochtime format, in other words a progressive number, so it's the same thing.
I usually use earliest and latest.
Ciao.
Giuseppe
Whereas there is no numeric difference, I am also curious as to which one is faster. I usually go with min/max with the following reasoning:
The second argument, of course, is flawed. It should depend on implementation of index and search. Any Splunk insider to shed light on this?