Splunk Search

Standardizing Account_Name for Event 4769 to match others?

kearaspoor
SplunkTrust
SplunkTrust

I'm trying to use EventCode 4769 along with several other EventCodes in a search and am running into the problem that for this code all the Account_Name fields contain the fully qualified name (name@domain) while the other fields are just the name. I need to somehow need to get the Account_Name field for this code only, to stop reading at the @ sign.

Any thoughts would be greatly appreciated! Thank you!

Tags (3)
0 Karma
1 Solution

the_wolverine
Champion
| rex field=Account_Name "(?<Account_Name>[^@]+)"

View solution in original post

0 Karma

the_wolverine
Champion
| rex field=Account_Name "(?<Account_Name>[^@]+)"
0 Karma

kearaspoor
SplunkTrust
SplunkTrust

Thank you! That was exactly what I needed!

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...