Splunk Search

How to filter the events

gladiatorankit
Explorer

When input a value in a search box it shows all the events and all the values are displayed which are not in the file anymore. How to restrict events to show the latest results in a txt file? Or should I reindex the file?

Tags (1)
0 Karma
1 Solution

yannK
Splunk Employee
Splunk Employee

"which are not in the file anymore"
Yes, this is what Splunk is about, a timebase search tool for events with a timestamp.
It doesn't know anything about what is in the log file now.
If you want to see the latest values, restrict the search time range.

if your log file is always the same format with fields (like a configuration file), and is erased and replaced by the new version, you could use the "dedup" command to retrieve the latest values for a given field.

View solution in original post

yannK
Splunk Employee
Splunk Employee

"which are not in the file anymore"
Yes, this is what Splunk is about, a timebase search tool for events with a timestamp.
It doesn't know anything about what is in the log file now.
If you want to see the latest values, restrict the search time range.

if your log file is always the same format with fields (like a configuration file), and is erased and replaced by the new version, you could use the "dedup" command to retrieve the latest values for a given field.

gladiatorankit
Explorer

Thanks alot for sharing the right command.

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...