Splunk Search

Why is time value being reversed?

manic3773
Engager

When I run the following search, the time is being show as the oldest first, but SysLog being shown as newest first

index=a host="1" [search index= a host="1" 166.87.245.164 id=* | fields id] | stats values(_time) AS Time values(src) as Client_IP values(syslog_message) as SysLog by id | sort -Time

How can swap either Time or Syslog so they match.

0 Karma
1 Solution

woodcock
Esteemed Legend

Switch from values to list but beware that list tops out at 100 values:

index=a host="1" [search index= a host="1" 166.87.245.164 id=* | fields id]
| stats list(_time) AS Time list(src) AS Client_IP list(syslog_message) AS SysLog BY id

View solution in original post

woodcock
Esteemed Legend

Switch from values to list but beware that list tops out at 100 values:

index=a host="1" [search index= a host="1" 166.87.245.164 id=* | fields id]
| stats list(_time) AS Time list(src) AS Client_IP list(syslog_message) AS SysLog BY id
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...

Design, Compete, Win: Submit Your Best Splunk Dashboards for a .conf26 Pass

Hello Splunkers,  We’re excited to kick off a Splunk Dashboard contest! We know that dashboards are a primary ...

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...