I am struggling to find a text string - "TargetUserName" using SPLUNK. I have drilled down to the actual event log in question and can't get SPLUNK to display any of the data in the Event log General tab.
Could someone please advise how I can filter on TargetUserName
Thanks
Dave
Hi, I am having the same issue.
The events are displayed in the dashboard but not showing the information that I am interested in.
I cant see the name of the account that I have created.
To find a value of the field TargetUserName that is equal to Dave121:
TargetUserName="Dave121"
To search for Dave121 as plain text:
"Dave121"
If for some reason Splunk is not finding that TargetUserName is a field, then the second option should work. If you are searching Windows event logs, most of the time the username is in the User_Name or Account_Name fields. If you still are unable to find what you are looking for, please post a copy of the event.
I am trying to find the value for TargetUserName, but it would be useful to know how to find the text string too.
I know that an account that I am investigating has been used to logon to a system over the network, but searching for that account name, lets call it Dave121, doesn’t return any values.
So the ultimate question is how would find the value Dave121 for TargetUserName
Thanks
Dave
Are you trying to find the value for TargetUserName or the text string TargetUserName?