About searching with time
When you start a new search, the default time range is Last 24 hours. This range helps to avoid running searches with overly-broad time ranges that waste system resources and produce more results than you really need.
Whether you are running a new search, a report, or creating a dashboard, it is important to narrow the time range to only the dates or times that you really need.
Time is also crucial for determining what went wrong. You often know when something happened, if not exactly what happened. By looking at events that happened around the same time that something went wrong, can help correlate results and find the root cause of the problem.
This section discusses how to use time to narrow your search.
Select time ranges to apply to your search
This documentation applies to the following versions of Splunk® Enterprise: 6.5.1612 (Splunk Cloud only), 6.6.0, 6.6.1, 6.6.2, 6.6.3