Splunk Search

Using the field of first search in second search.

email2vamsi
Explorer

Hi experts,

Search 1:
    base search from JSON...
    | eval col1=strptime(taken_date,"%b %d %Y %H:%M:%S")
    | stats latest(col1) as max_col

The above search returns a single value.
Based on the single value max_col, i would like to run the below search which displays the
values of col1 only when col1 > (max_col-2629743).

   Search 2:
    base search from JSON...
    | eval col1=strptime(taken_date,"%b %d %Y %H:%M:%S")
    | eval max_col1_30= max_col-2629743
    | where col1 > max_col1_30
    | table col1 max_col1_30

Could you please help by joining both the searches?
Sub search is not working for me.
Thank you.

Labels (4)
0 Karma

to4kawa
Ultra Champion

use eventstats instead of stats

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...