Splunk Search

Using the field of first search in second search.

email2vamsi
Explorer

Hi experts,

Search 1:
    base search from JSON...
    | eval col1=strptime(taken_date,"%b %d %Y %H:%M:%S")
    | stats latest(col1) as max_col

The above search returns a single value.
Based on the single value max_col, i would like to run the below search which displays the
values of col1 only when col1 > (max_col-2629743).

   Search 2:
    base search from JSON...
    | eval col1=strptime(taken_date,"%b %d %Y %H:%M:%S")
    | eval max_col1_30= max_col-2629743
    | where col1 > max_col1_30
    | table col1 max_col1_30

Could you please help by joining both the searches?
Sub search is not working for me.
Thank you.

Labels (4)
0 Karma

to4kawa
Ultra Champion

use eventstats instead of stats

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...