To search Splunk events in reverse order, you can use tstats on either indexed fields (i.e. index, host, source, sourcetype, or any other fields you choose to index) or a data model (which I'd suggest should be accelerated). The preferred approach is to use a data model, and add your "upgraded" field to the data model itself as an eval. In this way, when you search against the data model, it both searches in reverse and automatically calculates the value of "upgraded".
e.g.: | tstats values(upgraded) FROM datamodel=upgrade BY _time, host
... View more