Splunk Search

Using latest= in search results in all time, not today

kmattern
Builder

alt textI have this very simple search

sourcetype=iis latest=+6h

When I select Today from the date/time picker and run the search it returns results for all time. My iis logs are UTC but are converted to Central time by Splunk. I need the 6 hour offset to get the times to match existing non Splunk reports.

As can be seen in the screen shot the search continued to a point much earliern than midnight today, November 16. Seeing this happen is very scary because it throws into doubt many of my production dashboard results. Does anyone have any ideas?

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

When you put "latest" in your search, it trumps the selection in the date/time picker. The workaround is to also include "earliest" in your search string.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

When you put "latest" in your search, it trumps the selection in the date/time picker. The workaround is to also include "earliest" in your search string.

---
If this reply helps you, Karma would be appreciated.

kmattern
Builder

Doh! I shold have known that. It's been a long year.

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...