<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to display 2 fields from different sources into a table? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741279#M240572</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250014"&gt;@charlottelimcl&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;about Object_Name, please use this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog source=wineventlog:security (EventCode=4688 OR (EventCode=4663 Object_Name="*hello.exe" Process_Name="*welcome.exe"))
| stats 
     earliest(_time) AS _time
     values(ComputerName) AS ComputerName
     values(Object_Name) AS Object_Name
     values(eval(if(EventCode=4663,Process_Name,"") AS New_Process_Name   
     values(eval(if(EventCode=4688,Process_Name,"") AS Initiating_Process_Name
     BY Account_name&lt;/LI-CODE&gt;&lt;P&gt;About the time occurring for the execution, this is the more performant way to create a search, if you try with join you'll have a more longer time for the execution.&lt;/P&gt;&lt;P&gt;To optimize the search, you should try some acceleration method&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.1/Knowledge/Aboutsummaryindexing" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.4.1/Knowledge/Aboutsummaryindexing&lt;/A&gt;&amp;nbsp;or&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.1/Knowledge/Acceleratetables" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.4.1/Knowledge/Acceleratetables&lt;/A&gt;&amp;nbsp; or use a Data Model&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Aboutdatamodels" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Aboutdatamodels&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Mon, 10 Mar 2025 09:20:38 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2025-03-10T09:20:38Z</dc:date>
    <item>
      <title>How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741270#M240564</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have the following query:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog source=wineventlog:security EventCode=4688
[search index=wineventlog source=wineventlog:security EventCode=4663 Object_Name="*hello.exe" Process_Name="*welcome.exe"
| fields Account_Name Process_Name 
| rename Process_Name as New_Process_Name]
| table _time ComputerName Account_Name New_Process_Name Initiating_Process_Name &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EventCode=4663 has a field called Object_Name, while EventCode=4688 does not. My end result is that I want to display a table to show the Object_Name column alongside with New_Process_Name and Initiating_Process_Name.&lt;/P&gt;&lt;P&gt;The above query identifies the Account_Name and New_Process_Name (of the subsearch) and is fed into the main search to identify the Initiating_Process_Name. I want to be able to include the Object_Name from EventCode=4663 into this table as well. How can i do it?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 07:56:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741270#M240564</guid>
      <dc:creator>charlottelimcl</dc:creator>
      <dc:date>2025-03-10T07:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741273#M240567</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250014"&gt;@charlottelimcl&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;subsearch is used only to filter results from the main search using the results of the subsearch, you instead need a join, but, please, aviud to use the join command because it's very slow and resource consuming.&lt;/P&gt;&lt;P&gt;You could use a solution like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog source=wineventlog:security (EventCode=4688 OR (EventCode=4663 Object_Name="*hello.exe" Process_Name="*welcome.exe"))
| stats 
     earliest(_time) AS _time
     values(ComputerName) AS ComputerName
     values(eval(if(EventCode=4663,Process_Name,"") AS New_Process_Name   
     values(eval(if(EventCode=4688,Process_Name,"") AS Initiating_Process_Name
     BY Account_name&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;You should adapt this approach to your requirements.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 08:04:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741273#M240567</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-03-10T08:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741275#M240568</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;, thanks for your advise. I tried running the search below but it takes quite a long time to show results. Furthermore the query does not display Object_Name as needed&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 08:50:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741275#M240568</guid>
      <dc:creator>charlottelimcl</dc:creator>
      <dc:date>2025-03-10T08:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741279#M240572</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250014"&gt;@charlottelimcl&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;about Object_Name, please use this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog source=wineventlog:security (EventCode=4688 OR (EventCode=4663 Object_Name="*hello.exe" Process_Name="*welcome.exe"))
| stats 
     earliest(_time) AS _time
     values(ComputerName) AS ComputerName
     values(Object_Name) AS Object_Name
     values(eval(if(EventCode=4663,Process_Name,"") AS New_Process_Name   
     values(eval(if(EventCode=4688,Process_Name,"") AS Initiating_Process_Name
     BY Account_name&lt;/LI-CODE&gt;&lt;P&gt;About the time occurring for the execution, this is the more performant way to create a search, if you try with join you'll have a more longer time for the execution.&lt;/P&gt;&lt;P&gt;To optimize the search, you should try some acceleration method&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.1/Knowledge/Aboutsummaryindexing" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.4.1/Knowledge/Aboutsummaryindexing&lt;/A&gt;&amp;nbsp;or&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.1/Knowledge/Acceleratetables" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.4.1/Knowledge/Acceleratetables&lt;/A&gt;&amp;nbsp; or use a Data Model&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Aboutdatamodels" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Aboutdatamodels&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 09:20:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741279#M240572</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-03-10T09:20:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741290#M240577</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250014"&gt;@charlottelimcl&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check this :- I have used makeresults command for dummy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kiran_panchavat_1-1741600730949.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/38068i3FEC0710D3D3AA7C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="kiran_panchavat_1-1741600730949.png" alt="kiran_panchavat_1-1741600730949.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;PRE&gt;| makeresults
| eval _raw="
_time,ComputerName,Account_Name,EventCode,Object_Name,Process_Name
2023-10-27 10:00:00,PC1,user1,4688,,/path/to/parent.exe
2023-10-27 10:00:01,PC1,user1,4663,/path/to/hello.exe,/path/to/welcome.exe
2023-10-27 10:01:00,PC2,user2,4688,,/path/to/another.exe
2023-10-27 10:01:02,PC2,user2,4663,/path/to/goodbye.exe,/path/to/start.exe
2023-10-27 10:02:00,PC3,user3,4688,,/path/to/third.exe
2023-10-27 10:02:03,PC3,user3,4663,/path/to/final.exe,/path/to/launch.exe
"
| multikv forceheader=1
| eval _time=strptime(_time,"%Y-%m-%d %H:%M:%S")
| stats 
    earliest(_time) AS _time
    values(ComputerName) AS ComputerName
    values(eval(if(EventCode=4663, Process_Name, ""))) AS New_Process_Name
    values(eval(if(EventCode=4688, Process_Name, ""))) AS Initiating_Process_Name
    values(eval(if(EventCode=4663, Object_Name, ""))) AS Object_Name
BY Account_Name
| table _time ComputerName Account_Name New_Process_Name Initiating_Process_Name Object_Name&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this example:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;makeresults&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;generates dummy events.&lt;/LI&gt;&lt;LI&gt;eval&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;creates the raw data with the necessary fields.&lt;/LI&gt;&lt;LI&gt;multikv&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;parses the raw data into individual fields.&lt;/LI&gt;&lt;LI&gt;stats&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;aggregates the data as per your requirements.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 10 Mar 2025 10:00:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/741290#M240577</guid>
      <dc:creator>kiran_panchavat</dc:creator>
      <dc:date>2025-03-10T10:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742161#M240784</link>
      <description>&lt;P&gt;Many thanks for your reply. Maybe I could add some clarity to the exact results I want:&lt;/P&gt;&lt;P&gt;First inner search:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog source=wineventlog:security EventCode=4663 Object_Name="*hello.exe" Process_Name="*welcome.exe" 
| table _time ComputerName Object_Name Process_Name&lt;/LI-CODE&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="25%"&gt;_time&lt;/TD&gt;&lt;TD width="25%"&gt;ComputerName&lt;/TD&gt;&lt;TD width="25%"&gt;Object_Name&lt;/TD&gt;&lt;TD width="25%"&gt;Process_Name&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="25%"&gt;2025-03-19 12:00:00&lt;/TD&gt;&lt;TD width="25%"&gt;ABCDE&lt;/TD&gt;&lt;TD width="25%"&gt;\ABC\hello.exe&lt;/TD&gt;&lt;TD width="25%"&gt;welcome.exe&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next, when I search EventCode=4688, this is a sample search and outcome:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog source=wineventlog:security EventCode=4688 Process_Name="*welcome.exe" 
| table _time ComputerName Process_Name Initiating_Process_Name​&lt;/LI-CODE&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="25%"&gt;_time&lt;/TD&gt;&lt;TD width="25%"&gt;ComputerName&lt;/TD&gt;&lt;TD width="25%"&gt;Process_Name&lt;/TD&gt;&lt;TD width="25%"&gt;Initiating_Process_Name&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="25%"&gt;2025-03-19 12:00:00&lt;/TD&gt;&lt;TD width="25%"&gt;ABCDE&lt;/TD&gt;&lt;TD width="25%"&gt;welcome.exe&lt;/TD&gt;&lt;TD width="25%"&gt;cmd.exe&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;WHAT I WANT:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I want to feed this into the next search in EventCode=4688 to identify the Process Name and subsequently linking to the Initiating_Process_Name that appear as a result of the above search, i.e.&lt;/P&gt;&lt;P&gt;Final outcome I want:&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="20%"&gt;_time&lt;/TD&gt;&lt;TD width="20%"&gt;ComputerName&lt;/TD&gt;&lt;TD width="20%"&gt;Object_Name&lt;/TD&gt;&lt;TD width="20%"&gt;Process_Name&lt;/TD&gt;&lt;TD width="20%"&gt;Initiating_Process_Name&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%"&gt;2025-03-19 12:00:00&lt;/TD&gt;&lt;TD width="20%"&gt;ABCDE&lt;/TD&gt;&lt;TD width="20%"&gt;\ABC\hello.exe&lt;/TD&gt;&lt;TD width="20%"&gt;welcome.exe&lt;/TD&gt;&lt;TD width="20%"&gt;cmd.exe&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is, EventCode=4688 only has Process_Name and Initiating_Process_Name and NO Object_Name, while EventCode=4663 only has Object_Name and Process_Name and NO Initiaitng_Process_Name.&lt;/P&gt;&lt;P&gt;The common linkingfactor would be the Process_Name to correlate this two events together.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can i do this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 04:28:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742161#M240784</guid>
      <dc:creator>charlottelimcl</dc:creator>
      <dc:date>2025-03-19T04:28:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742166#M240786</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250014"&gt;@charlottelimcl&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you have to correlate events using stats:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog source=wineventlog:security EventCode IN (4663,4688) Process_Name="*welcome.exe" 
| stats 
     earliest(_time) AS _time 
     values(Object_Name) AS Object_Name
     BY ComputerName Process_Name
| table _time ComputerName Process_Name Initiating_Process_Name​&lt;/LI-CODE&gt;&lt;P&gt;Ciao&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 08:04:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742166#M240786</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-03-19T08:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742167#M240787</link>
      <description>&lt;P&gt;OK. That might be simple, but not easy.&lt;/P&gt;&lt;P&gt;But firstly, let's dig a bit into your search.&lt;/P&gt;&lt;P&gt;It contains a subsearch. A subsearch is executed first and rendered into a set of conditions which are inserted into the outer search. So there is no way to "relay" additional fields into the results. As simple as that. So you need another way (most probably some stats-based solution like the one shown by &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt; ).&lt;/P&gt;&lt;P&gt;But.&lt;/P&gt;&lt;P&gt;Remember that subsearch has its limitations and at this moment you might actually not be getting correct results (even ignoring the lack of additional fields). The subsearch will get silently finalized after reaching execution timeout (by default it's 60 seconds) or results number (by default - 10k) and you will not be notified about this in any way. So you might actually be getting incomplete results without knowing it.&lt;/P&gt;&lt;P&gt;OK. Back to the original issue.&lt;/P&gt;&lt;P&gt;You have two data sets. One is produced by&lt;/P&gt;&lt;PRE&gt;index=wineventlog source=wineventlog:security EventCode=4688&lt;/PRE&gt;&lt;P&gt;Another one by&lt;/P&gt;&lt;PRE&gt;index=wineventlog source=wineventlog:security EventCode=4663 Object_Name="*hello.exe" Process_Name="*welcome.exe"&lt;/PRE&gt;&lt;P&gt;As a side note, let me point out that searching for terms like "*hello.exe" and "*welcome.exe" is very inefficient since Splunk cannot use its internal indexes of terms to find those ones so it has to parse all events matching other conditions. If you can avoid it, don't use wildcards at the beginning of the search term.&lt;/P&gt;&lt;P&gt;So while the general approach of searching for&lt;/P&gt;&lt;PRE&gt;(index=wineventlog source=wineventlog:security EventCode=4688) OR (index=wineventlog source=wineventlog:security EventCode=4663 Object_Name="*hello.exe" Process_Name="*welcome.exe")&lt;/PRE&gt;&lt;P&gt;Which can be&amp;nbsp; simplified to&lt;/P&gt;&lt;PRE&gt;index=wineventlog source=wineventlog:security (EventCode=4688 OR (EventCode=4663 Object_Name="*hello.exe" Process_Name="*welcome.exe"))&lt;/PRE&gt;&lt;P&gt;And then doing&lt;/P&gt;&lt;PRE&gt;| stats values(field1) values(field2) &amp;lt;...&amp;gt; by commonfield1 commonfield2 &amp;lt;...&amp;gt;&lt;/PRE&gt;&lt;P&gt;is sound and is the way to go in general and if it's slow, it's probably due to&lt;/P&gt;&lt;P&gt;a) Amount of data you have to process&lt;/P&gt;&lt;P&gt;b) The wildcarded search terms. If you can narrow it, it would be much much more efficient.&lt;/P&gt;&lt;P&gt;Just for a test, try to search for&lt;/P&gt;&lt;PRE&gt;index=wineventlog source=wineventlog:security EventCode=4663 Object_Name="*hello.exe" Process_Name="*welcome.exe"&lt;/PRE&gt;&lt;P&gt;alone (maybe pass it to | stats count so that you don't have to drag all those events around; just check how long it takes to dig through the index).&lt;/P&gt;&lt;P&gt;If it takes long, it means your original search (the one with the subsearch) was simply getting finalized early.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 08:15:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742167#M240787</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-03-19T08:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742170#M240788</link>
      <description>&lt;P&gt;i tried entering this with a slight tweak to the query:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog source=wineventlog:security EventCode IN (4663,4688) Process_Name="*welcome.exe" 
| stats 
     earliest(_time) AS _time 
     values(Object_Name) AS Object_Name
     BY ComputerName Process_Name
| table _time ComputerName Object_Name Process_Name Initiating_Process_Name​&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;, however this is my result:&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="20%" height="24px"&gt;_time&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;ComputerName&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;Object_Name&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;Process_Name&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;Initiating_Process_Name&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%" height="24px"&gt;2025-03-19 16:00&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;ABCDE&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;object.exe&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;welcome.exe&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;(blank)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am still not able to get all 3 columns (object name, process name, initiating process name) into the same table.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 08:26:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742170#M240788</guid>
      <dc:creator>charlottelimcl</dc:creator>
      <dc:date>2025-03-19T08:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to display 2 fields from different sources into a table?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742178#M240791</link>
      <description>&lt;P&gt;If you do&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;| stats 
     earliest(_time) AS _time 
     values(Object_Name) AS Object_Name
     BY ComputerName Process_Name&lt;/PRE&gt;&lt;P&gt;You only have _time, Object_Name, ComputerName and Process_Name fields as output. Adding non-existing field in table command doesn't magically populate its contents.&lt;/P&gt;&lt;P&gt;You need to add Initiating_Proces_Name either as aggregation with values() or as the BY field.&lt;/P&gt;&lt;P&gt;The table command, BTW, is not needed after this stats.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 09:42:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-display-2-fields-from-different-sources-into-a-table/m-p/742178#M240791</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-03-19T09:42:09Z</dc:date>
    </item>
  </channel>
</rss>

