<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using REX field Command How? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Using-REX-field-Command-How/m-p/442508#M5974</link>
    <description>&lt;P&gt;06/02/2018 06:00:37 AM&lt;BR /&gt;
LogName=Application&lt;BR /&gt;
SourceName=MSSQLSERVER&lt;BR /&gt;
EventCode=18456&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=pwchdstgdw01.camilo.net&lt;BR /&gt;
User=NOT_TRANSLATED&lt;BR /&gt;
Sid=S-1-5-21-825750147-1553096506-3895987836-639042&lt;BR /&gt;
SidType=0&lt;BR /&gt;
TaskCategory=Logon&lt;BR /&gt;
OpCode=None&lt;BR /&gt;
RecordNumber=1185644&lt;BR /&gt;
Keywords=Audit Failure, Classic&lt;BR /&gt;
Message=Login failed for user 'M-core\caadmin'. Reason: Failed to open the explicitly specified database 'SSCap'. &lt;BR /&gt;
[CLIENT: 10.97.41.171]&lt;/P&gt;</description>
    <pubDate>Sun, 10 Jun 2018 23:54:09 GMT</pubDate>
    <dc:creator>atulod1</dc:creator>
    <dc:date>2018-06-10T23:54:09Z</dc:date>
    <item>
      <title>Using REX field Command How?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Using-REX-field-Command-How/m-p/442508#M5974</link>
      <description>&lt;P&gt;06/02/2018 06:00:37 AM&lt;BR /&gt;
LogName=Application&lt;BR /&gt;
SourceName=MSSQLSERVER&lt;BR /&gt;
EventCode=18456&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=pwchdstgdw01.camilo.net&lt;BR /&gt;
User=NOT_TRANSLATED&lt;BR /&gt;
Sid=S-1-5-21-825750147-1553096506-3895987836-639042&lt;BR /&gt;
SidType=0&lt;BR /&gt;
TaskCategory=Logon&lt;BR /&gt;
OpCode=None&lt;BR /&gt;
RecordNumber=1185644&lt;BR /&gt;
Keywords=Audit Failure, Classic&lt;BR /&gt;
Message=Login failed for user 'M-core\caadmin'. Reason: Failed to open the explicitly specified database 'SSCap'. &lt;BR /&gt;
[CLIENT: 10.97.41.171]&lt;/P&gt;</description>
      <pubDate>Sun, 10 Jun 2018 23:54:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Using-REX-field-Command-How/m-p/442508#M5974</guid>
      <dc:creator>atulod1</dc:creator>
      <dc:date>2018-06-10T23:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: Using REX field Command How?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Using-REX-field-Command-How/m-p/442509#M5975</link>
      <description>&lt;P&gt;@atulod1 please add more details on what you need to extract using rex. Based on the data seems like you are you are using Windows Event Viewer Logs which should be automatically extracted as fields in Splunk.&lt;/P&gt;

&lt;P&gt;Also while posting question on Splunk Answers make sure you mask/anonymize any sensitive information like User Id, database, Computer Name etc.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jun 2018 06:53:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Using-REX-field-Command-How/m-p/442509#M5975</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2018-06-11T06:53:11Z</dc:date>
    </item>
  </channel>
</rss>

