Hi @supriyagaw08, If WORK_NM is only exist on sub-search that is why your "field2" token filters everything on the first search. It will make Splunk search/join more events but below may work; $Env$ sourcetype = s
| table XMIT_NM,USER_NM,WORK_ID,FILE_NM,FILE_ID
| join
[ search $Env$ sourcetype=b
| table WORK_ID WORK_NM ]
| search $field2$$input$
| table XMIT_NM,USER_NM,WORK_NM,FILE_NM,FILE_ID If this reply helps you an upvote is appreciated.
... View more