Splunk Search

How to add time parameter in query

tkadale
Path Finder

How to search something for specific time period. For example I want to show Max CPU usage for each host for Last 24 hours. And want to do it through query and don't want to use TimeRangePicker. Can anybody Help??

Thanks in Advance!

Tags (1)
0 Karma

Ant1D
Motivator

You should be able to this. Here's an example:

index=myindex earliest=-24h

This will return all events in the index named myindex in the last 24 hours. You just need to add the parameter earliest=some_time_period as shown above

0 Karma

fox
Path Finder

search earliest=-24h should do the trick - there is good documentation on this and other time commands in the search pdf file downloadable from the splunk website.

0 Karma
Get Updates on the Splunk Community!

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...