Splunk Search

Why are stats functions first() and latest() not returning the same result?



I am a little bit confused by the functions latest() and earliest().
Running this search:

index=myindex sourcetype=mysourcetype | stats first(myfield) latest(myfield) earliest(myfield) last(myfield) by sourcetype

Gives us

    first(myfield)      latest(myfield) earliest(myfield) last(myfield) 
    1434767753.755  1434767758.840  1383228859.223  1383228859.223

It is, from my point of view, normal to have the same value returned by earliest() and last(), as we did not change the order of the events. I am surprised to receive different values for first() and latest().

If we run:

index=myindex sourcetype=mysourcetype | head 1 | table myfield

We get:


The value returned by latest() seems to be correct. What is returned by first()?


PS - We are running on Splunk Enterprise 6.2.3

Tags (3)
0 Karma


first() gives you the value first seen by the reporting command, with no regard for the timestamp. Depending on what's returned first to the search head from the indexers this may or may not match with latest().

0 Karma
Register for .conf21 Now! Go Vegas or Go Virtual!

How will you .conf21? You decide! Go in-person in Las Vegas, 10/18-10/21, or go online with .conf21 Virtual, 10/19-10/20.