<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Getting a value from subsearch in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307921#M92371</link>
    <description>&lt;P&gt;I updated the OP with more detail about what I'm trying to get.&lt;/P&gt;</description>
    <pubDate>Fri, 31 Mar 2017 21:30:52 GMT</pubDate>
    <dc:creator>tmontney</dc:creator>
    <dc:date>2017-03-31T21:30:52Z</dc:date>
    <item>
      <title>Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307911#M92361</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;(index="myindex" OR index="wineventlog") AND ((host=MYSERVER1 OR host=MYSERVER2) AND (EventCode=20274 OR EventCode=20271)) OR ((fw="192.168.10.20") AND (msg="User logged in" OR msg="User failed to logon"))
| rename _time AS earliest
| rename EventCode AS tEventCode
| eval Username=case(tEventCode=20274, mvindex(split(body, " "), 5), tEventCode=20271, mvindex(split(body, " "), 3), 1=1, usr)
| eval preSource=case(tEventCode=20271, mvindex(split(body, " "), 6), tEventCode=20274, mvindex(split(body, " "), 14), 1=1, src)
| eval Source=[search index="wineventlog" EventCode=6278 Connection_Request_Policy_Name="MYPOLICY" | eval SubSource=case(EventCode=="20274" AND Account_Name==Username AND earliest==_time, Calling_Station_Identifier) | eval SubSource=case(SubSource="", Source) | fields SubSource | rename SubSource as query]
| eval FSource=case(like(Source, "10.%"), Source, like(Source,"172.16.%"), Source, like(Source,"192.168.%"), Source, 1=1, "http://". Source .".ipaddress.com")
| sort Date Time Reason
| table Username Reason FSource
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Get the following error.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Error in 'eval' command: The expression is malformed. An unexpected character is reached at ')'. 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Basically, if the main search gets a result that's EventCode 20274, it's to perform another search looking for an event 6278 with the same account name and date/time as the 20274 event. I'm looking to extract the IP address in 6278, as it isn't contained in 20274.&lt;/P&gt;

&lt;P&gt;This 'eval' is called near the end of my query, before I sort and table everything.&lt;/P&gt;

&lt;P&gt;Event 20274 is when a user successfully authenticates with a RADIUS server. It contains the username and private IP address of the session. The private IP address is the IP assigned to the user, from a DHCP pool. The problem is just that, it's a &lt;STRONG&gt;private IP&lt;/STRONG&gt;. If the user failed to authenticate, then it gives the public IP. If you want to know the public IP of a successful RADIUS authentication, you need to look at event 6278 (NAP policy). On successful login, the user requests a NAP policy, one being RADIUS. The NAP event lists the public IP that requested it.&lt;/P&gt;

&lt;P&gt;tl;dr I want to correlate 20274's with 6278's, as both have information I need. Where 20274 exists, 6278 exists.&lt;/P&gt;

&lt;P&gt;The other issue is that there really isn't that much between the two. There's no direct reference. However, since they both happen at the same time, I'd use time and username assigned to match them.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 19:26:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307911#M92361</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2017-03-31T19:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307912#M92362</link>
      <description>&lt;P&gt;You current subsearch returns value with field name and hence the error. You need to return the value, so try like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| eval Source=[search index="wineventlog" EventCode=6278 Connection_Request_Policy_Name="POLICY NAME" | eval SubSource=case(EventCode=="20274" AND Account_Name==Username AND earliest==_time, Calling_Station_Identifier) | eval SubSource=case(SubSource="", Source) | fields SubSource| rename SubSource as query]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;v2&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; | eval Source=[search index="wineventlog" EventCode=6278 Connection_Request_Policy_Name="POLICY NAME" | eval SubSource=case(EventCode=="20274" AND Account_Name==Username AND earliest==_time, Calling_Station_Identifier) | eval SubSource=case(SubSource="", Source) | eval query="\"".SubSource."\"" | table query]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 31 Mar 2017 19:43:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307912#M92362</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-03-31T19:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307913#M92363</link>
      <description>&lt;P&gt;No good. I updated my post with the whole query.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 19:56:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307913#M92363</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2017-03-31T19:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307914#M92364</link>
      <description>&lt;P&gt;How many results the subsearch is returning? It should be returning just one, right?&lt;BR /&gt;
Try v2 as well.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 20:08:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307914#M92364</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-03-31T20:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307915#M92365</link>
      <description>&lt;P&gt;Yeah, there should be 1 to 1. Basically, if the event id in the main search is 20274, I search event code 6278 (as subsearch) to replace the IP address found (in 20274). The IP in 20274 is always private, and the 6278 event has the public ip.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 20:15:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307915#M92365</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2017-03-31T20:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307916#M92366</link>
      <description>&lt;P&gt;Same result.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 20:17:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307916#M92366</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2017-03-31T20:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307917#M92367</link>
      <description>&lt;P&gt;You can't pass a value from main search to subsearch. Your subsearch is getting data for &lt;CODE&gt;EventCode=6278&lt;/CODE&gt; and your eval-case is base off EventCode on main search, thus it returns null and hence the error. How can you correlate which private IP belongs to which public IP, username and time??&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 20:49:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307917#M92367</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-03-31T20:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307918#M92368</link>
      <description>&lt;P&gt;Semantic note - Your initial search is &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(index) AND (condition) OR (condition)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Combining &lt;CODE&gt;AND&lt;/CODE&gt;s and &lt;CODE&gt;OR&lt;/CODE&gt;s at the same level is problematic.  &lt;CODE&gt;AND&lt;/CODE&gt; has the higher precedence, so that is semantically interpreted as &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;( (index) AND  (condition))  OR  (condition)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Indexes are special, so Splunk MIGHT override the above precedence.  Without the word &lt;CODE&gt;AND&lt;/CODE&gt;, I would expect the &lt;CODE&gt;index=&lt;/CODE&gt; clause to apply to both the following alternatives, but &lt;STRONG&gt;with&lt;/STRONG&gt; the &lt;CODE&gt;AND&lt;/CODE&gt;, I would not be certain.  &lt;/P&gt;

&lt;P&gt;You should clarify the search with parenthesis.  I believe you meant..,.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(index) AND ( (condition) OR (condition) )
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 31 Mar 2017 20:50:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307918#M92368</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-03-31T20:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307919#M92369</link>
      <description>&lt;P&gt;It's not ideal, and the two events don't have much more than time, account, and private ip. Both events should happen at the same time. If I compare those three things, there's very little chance it's another event.&lt;/P&gt;

&lt;P&gt;OK, then how would you approach it?&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 21:12:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307919#M92369</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2017-03-31T21:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307920#M92370</link>
      <description>&lt;P&gt;The public IP that you're looking for is only for few specific hosts OR they can be many more dynamically?  Are you looking for public IP for host=SERVER1 OR host=SERVER2 ?&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 21:26:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307920#M92370</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-03-31T21:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307921#M92371</link>
      <description>&lt;P&gt;I updated the OP with more detail about what I'm trying to get.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 21:30:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307921#M92371</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2017-03-31T21:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307922#M92372</link>
      <description>&lt;P&gt;I guess you would need join here (due to already multiple data sources in base search, can't think of an easy way to merge there). Give this a try&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(index="myindex" OR index="wineventlog") ((host=SERVER1 OR host=SERVER2) AND (EventCode=20274 OR EventCode=20271)) 
OR ((fw="192.168.1.33") AND (msg="User login successful" OR msg="User login failed - invalid password")) 
OR ((host=SERVER1 OR host=SERVER2) EventCode=6278 Connection_Request_Policy_Name="PBDC VPN Connections")
 | eval joinEventCode=if(EventCode=20274,6278,null)
 | eval Username=case(EventCode=20274, mvindex(split(body, " "), 5), EventCode=20271, mvindex(split(body, " "), 3), 1=1, usr)
 | eval preSource=case(EventCode=20271, mvindex(split(body, " "), 6), EventCode=20274, mvindex(split(body, " "), 14), 1=1, src)
 | join _time index Username joinEventCode [search index="wineventlog" EventCode=6278 Connection_Request_Policy_Name="PBDC VPN Connections" | fields _time index Account_Name EventCode Calling_Station_Identifier| rename Account_Name as Username EventCode as joinEventCode ]
 | eval Source=case(isnull(Calling_Station_Identifier) OR Calling_Station_Identifier="", Source)
 | eval FSource=case(like(Source, "10.%"), Source, like(Source,"172.16.%"), Source, like(Source,"192.168.%"), Source, 1=1, "http://". Source .".ipaddress.com")
 | sort Date Time Reason
 | table Username Reason FSource
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 31 Mar 2017 21:46:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307922#M92372</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-03-31T21:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307923#M92373</link>
      <description>&lt;P&gt;Use this line instead:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; | eval Source=[search index="wineventlog" EventCode=6278 Connection_Request_Policy_Name="PBDC VPN Connections" | eval SubSource=if((EventCode=="20274" AND Account_Name==Username AND earliest==_time), Calling_Station_Identifier, null()) | eval SubSource=coalesce(SubSource, Source) | return $SubSource]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 31 Mar 2017 22:06:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307923#M92373</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-03-31T22:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307924#M92374</link>
      <description>&lt;P&gt;If I've interpreted your code and comment correctly, this should get the _time of a connection, the Username, and the private IP address.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;((index="myindex" OR index="wineventlog") AND (host=SERVER1 OR host=SERVER2) AND EventCode=20274)
| eval Username=coalesce(mvindex(split(body, " "), 5),usr)
| eval preSource=coalesce(mvindex(split(body, " "), 14),src)
| table _time Username preSource
| rename preSource as privateIP
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And this should get the _time of authentication, the Username, and the public IP address&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(index="wineventlog" EventCode=6278 Connection_Request_Policy_Name="PBDC VPN Connections")
| table _time, Account_Name, Calling_Station_Identifier
| rename Account_Name as Username, Calling_Station_Identifier as publicIP
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;...so try this...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; earliest=-10m latest=-5m EventCode=20274
(index="myindex" OR index="wineventlog") 
(host=SERVER1 OR host=SERVER2) 
| eval Username=coalesce(mvindex(split(body, " "), 5),usr)
| eval preSource=coalesce(mvindex(split(body, " "), 14),src)
| table _time Username preSource
| rename preSource as privateIP
| bin _time as Time span=1m
| head 10 
| join type=left Time Username 
   [ (earliest=-10m latest=-5m index="wineventlog" EventCode=6278 Connection_Request_Policy_Name="PBDC VPN Connections")
    | table _time, Account_Name, Calling_Station_Identifier
    | rename Account_Name as Username, Calling_Station_Identifier as publicIP
    | bin _time as Time span=1m
     | rename _time as authTime
   ]
| table Time _time authTime Username privateIP publicIP
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;... if that sample works, then we can proceed to pull in your other records.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 22:26:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307924#M92374</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-03-31T22:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307925#M92375</link>
      <description>&lt;P&gt;Needs more of an overhaul, probably to a map/search command. The OP is trying to differentiate in the subsearch between events in the search itself.  &lt;/P&gt;

&lt;P&gt;I don't think that &lt;CODE&gt;EventCode&lt;/CODE&gt; code has any chance of working, since the parent event has &lt;CODE&gt;EventCode=20274&lt;/CODE&gt; or &lt;CODE&gt;EventCode=20271&lt;/CODE&gt; and the child event has &lt;CODE&gt;EventCode=6278&lt;/CODE&gt;.   &lt;/P&gt;

&lt;P&gt;Likewise, &lt;CODE&gt;earliest&lt;/CODE&gt; in that spot isn't going to have the desired effect, if it works at all.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 22:33:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307925#M92375</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-03-31T22:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307926#M92376</link>
      <description>&lt;P&gt;Looks plausible.  Needs comma in rename command, IIRC.&lt;/P&gt;

&lt;P&gt;Not sure why index is in the join...?  &lt;/P&gt;

&lt;P&gt;My preference would be to change 1=1 to true() , and to align the case statements to the same order.  &lt;/P&gt;

&lt;P&gt;Also, Source needs to get Calling_Station_Identifier when it is present.&lt;/P&gt;

&lt;P&gt;I don't see where Date, Time, or Reason are coming from, or why the table command would remove the Date and Time if that's how they are going to sort.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:30:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307926#M92376</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2020-09-29T13:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307927#M92377</link>
      <description>&lt;P&gt;Never mind, somesoni2's more recent answer is farther along than this.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 22:43:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307927#M92377</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-03-31T22:43:22Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307928#M92378</link>
      <description>&lt;P&gt;I was focusing on the error that he had, not on the entire solution.  I am sure that you are correct about the other problems.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 22:44:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307928#M92378</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-03-31T22:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307929#M92379</link>
      <description>&lt;P&gt;I kinda figured it that way.  The more I looked at it, the more it seemed the thing was like Hughes' Spruce Goose ( never going to fly).  &lt;/P&gt;

&lt;P&gt;Somesoni2 overhauled the whole thing, and it appears fairly close but for some nits.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 22:47:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307929#M92379</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-03-31T22:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: Getting a value from subsearch</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307930#M92380</link>
      <description>&lt;P&gt;Must have left those by mistake. The eval references are normally there.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2017 13:04:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-a-value-from-subsearch/m-p/307930#M92380</guid>
      <dc:creator>tmontney</dc:creator>
      <dc:date>2017-04-03T13:04:09Z</dc:date>
    </item>
  </channel>
</rss>

