Splunk Search

earliest/latest returning zero results

DEAD_BEEF
Builder

I apologize as I feel I am missing something very basic, but for the life of me I cannot get this query to work. I have a simple query and it is returning zero results. If I remove the earliest/latest, I get tons of results.

What syntactical mistake am I making? I have the time picker set to 1 hour, but my understanding is that when using earliest/latest, they override the time picker.

index=firewall earliest=-24@h latest=-12@h
Tags (2)
0 Karma
1 Solution

sbbadri
Motivator

try this

index=firewall earliest=-24h@h latest=-12h@h

please go through below link,

http://docs.splunk.com/Documentation/Splunk/6.6.2/Search/Specifytimemodifiersinyoursearch

View solution in original post

sbbadri
Motivator

try this

index=firewall earliest=-24h@h latest=-12h@h

please go through below link,

http://docs.splunk.com/Documentation/Splunk/6.6.2/Search/Specifytimemodifiersinyoursearch

DEAD_BEEF
Builder

Ahhh... I completely overlooked that extra character. I read the documentation but was clearly scanning the syntax too fast. Thank you!

0 Karma

DalJeanis
Legend

I believe you are correct, and the explanation is that -24 means "subtract 24 seconds".

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...