Splunk Search

Why is sorting by time reducing the number of my search results?

ulrich_track
Path Finder

I made a search over two indexes (OR connected) and five sourcetypes (OR connected), limited the time to two days and received 26,300 events. Now I pipe this to a sort _time and suddenly only 10,000 of 26,300 events match?

What is wrong here? Since when does sorting filter results?

Example:

index="index-one" OR index="index-two" sourcetype="sourcetype-one" OR sourcetype="sourcetype-two" OR sourcetype="sourcetype-three" OR sourcetype="sourcetype-four" OR sourcetype="sourcetype-five" | sort _time
Tags (4)
0 Karma
1 Solution

tom_frotscher
Builder

Hi,

sort is limited to 10000 results. Use this:

| sort limit=0 _time

or just

| sort 0 _time

Greetings

Tom

View solution in original post

tom_frotscher
Builder

Hi,

sort is limited to 10000 results. Use this:

| sort limit=0 _time

or just

| sort 0 _time

Greetings

Tom

Get Updates on the Splunk Community!

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...