Splunk Search

presenting logs in reverse order

a212830
Champion

hI,

The default mode for Splunk is to show the most recent activity first. How can I show the logs from, say midnight to now, rather than now to midnight.

Tags (2)
1 Solution

somesoni2
Revered Legend

There is no setting to changes the Splunk's default chronological order of showing events (most recent to oldest). You can use "reverse" command to show events in opposite order.

See this
http://answers.splunk.com/answers/1691/how-to-reverse-the-order-of-displayed-events

View solution in original post

somesoni2
Revered Legend

There is no setting to changes the Splunk's default chronological order of showing events (most recent to oldest). You can use "reverse" command to show events in opposite order.

See this
http://answers.splunk.com/answers/1691/how-to-reverse-the-order-of-displayed-events

somesoni2
Revered Legend

The only problem with sort is that it doesn't handle events with same timestamp well like reverse does. Otherwise if there won't be events with same timestamp or you don't care about the order in that case, sort _time can be used.

agodoy
Communicator

I have found that the reverse command gives unexpected results, specially when there are a lot of events returned. Therefore, I use the sort command on the _time field.

<your search> | sort +_time
0 Karma

Jeff_Lightly_Sp
Communicator

Using REVERSE may do the job for you:

| reverse

Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...