Splunk Search

Why is time value being reversed?

manic3773
Engager

When I run the following search, the time is being show as the oldest first, but SysLog being shown as newest first

index=a host="1" [search index= a host="1" 166.87.245.164 id=* | fields id] | stats values(_time) AS Time values(src) as Client_IP values(syslog_message) as SysLog by id | sort -Time

How can swap either Time or Syslog so they match.

0 Karma
1 Solution

woodcock
Esteemed Legend

Switch from values to list but beware that list tops out at 100 values:

index=a host="1" [search index= a host="1" 166.87.245.164 id=* | fields id]
| stats list(_time) AS Time list(src) AS Client_IP list(syslog_message) AS SysLog BY id

View solution in original post

woodcock
Esteemed Legend

Switch from values to list but beware that list tops out at 100 values:

index=a host="1" [search index= a host="1" 166.87.245.164 id=* | fields id]
| stats list(_time) AS Time list(src) AS Client_IP list(syslog_message) AS SysLog BY id
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...