Splunk Search

presenting logs in reverse order

a212830
Champion

hI,

The default mode for Splunk is to show the most recent activity first. How can I show the logs from, say midnight to now, rather than now to midnight.

Tags (2)
1 Solution

somesoni2
Revered Legend

There is no setting to changes the Splunk's default chronological order of showing events (most recent to oldest). You can use "reverse" command to show events in opposite order.

See this
http://answers.splunk.com/answers/1691/how-to-reverse-the-order-of-displayed-events

View solution in original post

somesoni2
Revered Legend

There is no setting to changes the Splunk's default chronological order of showing events (most recent to oldest). You can use "reverse" command to show events in opposite order.

See this
http://answers.splunk.com/answers/1691/how-to-reverse-the-order-of-displayed-events

somesoni2
Revered Legend

The only problem with sort is that it doesn't handle events with same timestamp well like reverse does. Otherwise if there won't be events with same timestamp or you don't care about the order in that case, sort _time can be used.

agodoy
Communicator

I have found that the reverse command gives unexpected results, specially when there are a lot of events returned. Therefore, I use the sort command on the _time field.

<your search> | sort +_time
0 Karma

Jeff_Lightly_Sp
Communicator

Using REVERSE may do the job for you:

| reverse

Get Updates on the Splunk Community!

What's New in Splunk Enterprise 9.4: Features to Power Your Digital Resilience

Hey Splunky People! We are excited to share the latest updates in Splunk Enterprise 9.4. In this release we ...

Take Your Breath Away with Splunk Risk-Based Alerting (RBA)

WATCH NOW!The Splunk Guide to Risk-Based Alerting is here to empower your SOC like never before. Join Haylee ...

SignalFlow: What? Why? How?

What is SignalFlow? Splunk Observability Cloud’s analytics engine, SignalFlow, opens up a world of in-depth ...