Splunk Search

Exacting Account_Name from security logs

smudge797
Path Finder

Your rex command does nothing at all so we can remove it. You also are not using Region so it can go. The dedup command is more efficient that stats.

Try this:

index=security  sourcetype="WinEventLog:*" object="WinEventLog:Security"
| eval SID=Upper(SID) | dedup SID host
| table host SID
| lookup Phonebook_Lookup SID Output First_Name Last_Name
| sort 0 host
0 Karma

ryanoconnor
Builder

If you're only concerned about windows security logs, can you make the sourcetype WinEventLog:Security?

What is the goal of the rex command you have there? Account_Name is an extracted field.

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...