<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Related Fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450945#M168281</link>
    <description>&lt;P&gt;I did give some example events and which matches, but to clarify.. out of the above, only one event matches (the even with file_name cmd.exe)&lt;/P&gt;

&lt;P&gt;As a joined search I use the following:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;file_name=java.exe | join max=0 process_id [search file_name=cmd.exe | eval process_id=parent_process_id]&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;it just seems to take too long as a join.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 20:33:28 GMT</pubDate>
    <dc:creator>spohara79</dc:creator>
    <dc:date>2020-09-29T20:33:28Z</dc:date>
    <item>
      <title>Related Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450941#M168277</link>
      <description>&lt;P&gt;I have the following events:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;{
    "file_name": "java.exe",
    "process_id": "0fb9dcff-c345-4d76-ae53-af46cd34524a",
    "command_line": "something",
    "parent_process_id": "c3df993f-7802-430a-9ef5-e018910aed4b"
},
{
    "file_name": "other.exe",
    "process_id": "1451fd51-bbce-4c27-999a-ee514e09529f",
    "command_line": "some^thing",
    "parent_process_id": "0fb9dcff-c345-4d76-ae53-af46cd34524a"
},
{
    "file_name": "cmd.exe",
    "process_id": "23a192cf-5f2d-4f42-a753-595b702a280b",
    "command_line": "some^thing",
    "parent_process_id": "0fb9dcff-c345-4d76-ae53-af46cd34524a"
},
{
    "file_name": "blah.exe",
    "process_id": "16ffed00-1175-4554-b4a3-0ab45e8d691f",
    "command_line": "",
    "parent_process_id": "39a6cb9d-4dd7-4c44-9ffd-d8ee9561a1a3"
}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm trying to pull the events without a subsearch, where I'm looking for a process that has file_name=cmd.exe and a parent process with the file_name=java.exe;  In the above events, you see java.exe has two child process (other.exe and cmd.exe) and then a completely unrelated process called 'blah.exe'.   I'd like to just return cmd.exe (but only if the parent_process_id matches the process_id of another event with a file_name=java.exe) &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:32:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450941#M168277</guid>
      <dc:creator>spohara79</dc:creator>
      <dc:date>2020-09-29T20:32:46Z</dc:date>
    </item>
    <item>
      <title>Re: Related Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450942#M168278</link>
      <description>&lt;P&gt;Give us some example events and show which ones match with which to get your result set.  I don't get it.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jul 2018 15:48:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450942#M168278</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2018-07-18T15:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: Related Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450943#M168279</link>
      <description>&lt;P&gt;Hello @spohara,&lt;/P&gt;

&lt;P&gt;your question looks close to this one: &lt;A href="https://answers.splunk.com/answers/671770/getting-results-from-multiple-searches-without-app.html"&gt;https://answers.splunk.com/answers/671770/getting-results-from-multiple-searches-without-app.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;If you adapt the answer to your case, this will solve it.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jul 2018 15:54:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450943#M168279</guid>
      <dc:creator>poete</dc:creator>
      <dc:date>2018-07-18T15:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Related Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450944#M168280</link>
      <description>&lt;P&gt;I don't get the expected result.  It matches where all processes have a specific parent.  A single process can have multiple children.  I'm looking for a specific child process name.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jul 2018 21:43:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450944#M168280</guid>
      <dc:creator>spohara79</dc:creator>
      <dc:date>2018-07-19T21:43:32Z</dc:date>
    </item>
    <item>
      <title>Re: Related Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450945#M168281</link>
      <description>&lt;P&gt;I did give some example events and which matches, but to clarify.. out of the above, only one event matches (the even with file_name cmd.exe)&lt;/P&gt;

&lt;P&gt;As a joined search I use the following:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;file_name=java.exe | join max=0 process_id [search file_name=cmd.exe | eval process_id=parent_process_id]&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;it just seems to take too long as a join.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:33:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Related-Fields/m-p/450945#M168281</guid>
      <dc:creator>spohara79</dc:creator>
      <dc:date>2020-09-29T20:33:28Z</dc:date>
    </item>
  </channel>
</rss>

