Splunk Search

Why are stats functions first() and latest() not returning the same result?



I am a little bit confused by the functions latest() and earliest().
Running this search:

index=myindex sourcetype=mysourcetype | stats first(myfield) latest(myfield) earliest(myfield) last(myfield) by sourcetype

Gives us

    first(myfield)      latest(myfield) earliest(myfield) last(myfield) 
    1434767753.755  1434767758.840  1383228859.223  1383228859.223

It is, from my point of view, normal to have the same value returned by earliest() and last(), as we did not change the order of the events. I am surprised to receive different values for first() and latest().

If we run:

index=myindex sourcetype=mysourcetype | head 1 | table myfield

We get:


The value returned by latest() seems to be correct. What is returned by first()?


PS - We are running on Splunk Enterprise 6.2.3

Tags (3)
0 Karma


first() gives you the value first seen by the reporting command, with no regard for the timestamp. Depending on what's returned first to the search head from the indexers this may or may not match with latest().

0 Karma
Get Updates on the Splunk Community!

Accelerate Service Onboarding, Decomposition, Troubleshooting - and more with ITSI’s ...

Accelerate Service Onboarding, Decomposition, Troubleshooting - and more! Faster Time to ValueManaging and ...

New Release | Splunk Enterprise 9.3

Hi Splunky people! We are excited to share the newest updates in Splunk Enterprise 9.3!Admins and Analyst can ...

2024 Splunk Career Impact Survey | Earn a $20 gift card for participating!

Hear ye, hear ye! The time has come again for Splunk's annual Career Impact Survey!  We need your help by ...