Splunk Search

tables not displaying as desired

freeti00
Explorer

when using the following search:

source="/data/log/rla.log" eventtype="SessionStart" | convert ctime(_time) as timestr | table timestr, user, wanIP, NCIP, hostname | sendemail to=tim.freeman@blah.com sendresults=t

the columns start with wanIP, NCIP, timestr, etc.... Is there a way to force the order of the columns to what I want which is timestr, user, wanIP, etc...

Tags (1)

Stephen_Sorkin
Splunk Employee
Splunk Employee

This is bug SPL-31616 fixed in 4.1.4.

freeti00
Explorer

thanks, I will upgrade at the first oppourtunity

0 Karma
Get Updates on the Splunk Community!

The All New Performance Insights for Splunk

Splunk gives you amazing tools to analyze system data and make business-critical decisions, react to issues, ...

Good Sourcetype Naming

When it comes to getting data in, one of the earliest decisions made is what to use as a sourcetype. Often, ...

See your relevant APM services, dashboards, and alerts in one place with the updated ...

As a Splunk Observability user, you have a lot of data you have to manage, prioritize, and troubleshoot on a ...