Splunk Search

presenting logs in reverse order

a212830
Champion

hI,

The default mode for Splunk is to show the most recent activity first. How can I show the logs from, say midnight to now, rather than now to midnight.

Tags (2)
1 Solution

somesoni2
Revered Legend

There is no setting to changes the Splunk's default chronological order of showing events (most recent to oldest). You can use "reverse" command to show events in opposite order.

See this
http://answers.splunk.com/answers/1691/how-to-reverse-the-order-of-displayed-events

View solution in original post

somesoni2
Revered Legend

There is no setting to changes the Splunk's default chronological order of showing events (most recent to oldest). You can use "reverse" command to show events in opposite order.

See this
http://answers.splunk.com/answers/1691/how-to-reverse-the-order-of-displayed-events

somesoni2
Revered Legend

The only problem with sort is that it doesn't handle events with same timestamp well like reverse does. Otherwise if there won't be events with same timestamp or you don't care about the order in that case, sort _time can be used.

agodoy
Communicator

I have found that the reverse command gives unexpected results, specially when there are a lot of events returned. Therefore, I use the sort command on the _time field.

<your search> | sort +_time
0 Karma

Jeff_Lightly_Sp
Communicator

Using REVERSE may do the job for you:

| reverse

Get Updates on the Splunk Community!

Index This | Divide 100 by half. What do you get?

November 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

❄️ Celebrate the season with our December lineup of Community Office Hours, Tech Talks, and Webinars! ...

Splunk and Fraud

Watch Now!Watch an insightful webinar where we delve into the innovative approaches to solving fraud using the ...