<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Searching notable events in ES to match user field in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Searching-notable-events-in-ES-to-match-user-field/m-p/469070#M7092</link>
    <description>&lt;P&gt;Folks, I'm trying to match a field (user) from a search to see if any previous notable events ES have been generated for that use and output any match. &lt;/P&gt;

&lt;P&gt;Cannot seem to get any output &lt;/P&gt;

&lt;P&gt;Tried the below:&lt;/P&gt;

&lt;P&gt;index=*** sourcetype=*** category="alerttype"| rex field=fieldWithUserID "(?[^:]+$)" | search [ search &lt;CODE&gt;notable&lt;/CODE&gt;&lt;BR /&gt;
    | fields user dest &lt;BR /&gt;
    | format "(" "(" "OR" ")" "OR" ")"]  &lt;/P&gt;</description>
    <pubDate>Thu, 29 Aug 2019 18:01:35 GMT</pubDate>
    <dc:creator>marktechuk</dc:creator>
    <dc:date>2019-08-29T18:01:35Z</dc:date>
    <item>
      <title>Searching notable events in ES to match user field</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Searching-notable-events-in-ES-to-match-user-field/m-p/469070#M7092</link>
      <description>&lt;P&gt;Folks, I'm trying to match a field (user) from a search to see if any previous notable events ES have been generated for that use and output any match. &lt;/P&gt;

&lt;P&gt;Cannot seem to get any output &lt;/P&gt;

&lt;P&gt;Tried the below:&lt;/P&gt;

&lt;P&gt;index=*** sourcetype=*** category="alerttype"| rex field=fieldWithUserID "(?[^:]+$)" | search [ search &lt;CODE&gt;notable&lt;/CODE&gt;&lt;BR /&gt;
    | fields user dest &lt;BR /&gt;
    | format "(" "(" "OR" ")" "OR" ")"]  &lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2019 18:01:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Searching-notable-events-in-ES-to-match-user-field/m-p/469070#M7092</guid>
      <dc:creator>marktechuk</dc:creator>
      <dc:date>2019-08-29T18:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Searching notable events in ES to match user field</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Searching-notable-events-in-ES-to-match-user-field/m-p/469071#M7093</link>
      <description>&lt;P&gt;I think you are using the subsearch incorrectly:&lt;/P&gt;

&lt;P&gt;The [subsearch] finds the users and uses that list as an OR seperated filter in the main search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=notable [ index=YOURINDEX  sourcetype=YOURSOURCETYPE category="alerttype"| rex field=fieldWithUserID "(?&amp;lt;user&amp;gt;[^:]+$)" | fields user | dedupe user ]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 29 Aug 2019 18:20:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Searching-notable-events-in-ES-to-match-user-field/m-p/469071#M7093</guid>
      <dc:creator>solarboyz1</dc:creator>
      <dc:date>2019-08-29T18:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: Searching notable events in ES to match user field</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Searching-notable-events-in-ES-to-match-user-field/m-p/469072#M7094</link>
      <description>&lt;P&gt;great thanks, got it to work using your search. 5*&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2019 15:47:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Searching-notable-events-in-ES-to-match-user-field/m-p/469072#M7094</guid>
      <dc:creator>marktechuk</dc:creator>
      <dc:date>2019-09-03T15:47:35Z</dc:date>
    </item>
  </channel>
</rss>

