Splunk Search

How can I create extract the earliest and latest times for current search and create fields for them?

jedatt01
Builder

I would like to display the original earliest and latest of a search as fields in my table results. My query below.

index=myindex msg_severity=ERROR | timechart span=15m count by field_TEXT  | untable _time field_TEXT count | eval count = if(count=0,1,count) | streamstats window=2 global=f current=t first(count) As p_count by field_TEXT | eval percent_change=((count-p_count)/(p_count))*100

I would like to add something like this to the end of my search to show the earliest and latest of the search on every row

| eval start=$earliest | eval end=$latest

Is this possible?

0 Karma
1 Solution

javiergn
Super Champion

javiergn
Super Champion

jedatt01
Builder

Exactly what i needed!

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...