Splunk Search

How to add time parameter in query

tkadale
Path Finder

How to search something for specific time period. For example I want to show Max CPU usage for each host for Last 24 hours. And want to do it through query and don't want to use TimeRangePicker. Can anybody Help??

Thanks in Advance!

Tags (1)
0 Karma

Ant1D
Motivator

You should be able to this. Here's an example:

index=myindex earliest=-24h

This will return all events in the index named myindex in the last 24 hours. You just need to add the parameter earliest=some_time_period as shown above

0 Karma

fox
Path Finder

search earliest=-24h should do the trick - there is good documentation on this and other time commands in the search pdf file downloadable from the splunk website.

0 Karma
Get Updates on the Splunk Community!

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...