<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk query to fetch a particular string  from lot of data output in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258340#M176111</link>
    <description>&lt;P&gt;Fixed typo&lt;/P&gt;</description>
    <pubDate>Wed, 30 Nov 2016 14:38:27 GMT</pubDate>
    <dc:creator>sundareshr</dc:creator>
    <dc:date>2016-11-30T14:38:27Z</dc:date>
    <item>
      <title>Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258334#M176105</link>
      <description>&lt;P&gt;This is the out put of a splunk query for wineventlog index. From this we need to filter out a particular string "&lt;STRONG&gt;abc_mop_efg&lt;/STRONG&gt;" from "&lt;STRONG&gt;Account Name: abc_mop_efg&lt;/STRONG&gt;". Could you please let us know how can we design splunk query for the same?&lt;/P&gt;

&lt;P&gt;11/29/16&lt;BR /&gt;
6:33:20.000 PM&lt;BR /&gt;&lt;BR /&gt;
11/29/2016 06:33:20 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4625&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=prd.test.cop.com&lt;BR /&gt;
TaskCategory=Logon&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=36404036&lt;BR /&gt;
Keywords=Audit Failure&lt;BR /&gt;
Message=An account failed to log on.&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
    Security ID:        NULL SID&lt;BR /&gt;
    Account Name:       -&lt;BR /&gt;
    Account Domain:     -&lt;BR /&gt;
    Logon ID:       0x0&lt;/P&gt;

&lt;P&gt;Logon Type:         3&lt;/P&gt;

&lt;P&gt;Account For Which Logon Failed:&lt;BR /&gt;
    Security ID:        NULL SID&lt;BR /&gt;
    Account Name:       abc_mop_efg&lt;BR /&gt;
    Account Domain:     CORP&lt;/P&gt;

&lt;P&gt;Failure Information:&lt;BR /&gt;
    Failure Reason:     Unknown user name or bad password.&lt;BR /&gt;
    Status:         0xC000006D&lt;BR /&gt;
    Sub Status:     0xC0000064&lt;/P&gt;

&lt;P&gt;Process Information:&lt;BR /&gt;
    Caller Process ID:  0x0&lt;BR /&gt;
    Caller Process Name:    -&lt;/P&gt;

&lt;P&gt;Network Information:&lt;BR /&gt;
    Workstation Name:   PRD-SNr-MID-W&lt;BR /&gt;
    Source Network Address: 10.2.2.2&lt;BR /&gt;
    Source Port:        52536&lt;/P&gt;

&lt;P&gt;Detailed Authentication Information:&lt;BR /&gt;
    Logon Process:      NtLmSsp &lt;BR /&gt;
    Authentication Package: NTLM&lt;BR /&gt;
    Transited Services: -&lt;BR /&gt;
    Package Name (NTLM only):   -&lt;BR /&gt;
    Key Length:     0&lt;/P&gt;

&lt;P&gt;This event is generated when a logon request fails. It is generated on the computer where access was attempted.&lt;/P&gt;

&lt;P&gt;The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&lt;/P&gt;

&lt;P&gt;The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).&lt;/P&gt;

&lt;P&gt;The Process Information fields indicate which account and process on the system requested the logon.&lt;/P&gt;

&lt;P&gt;The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&lt;/P&gt;

&lt;P&gt;The authentication information fields provide detailed information about this specific logon request.&lt;BR /&gt;
    - Transited services indicate which intermediate services have participated in this logon request.&lt;BR /&gt;
    - Package name indicates which sub-protocol was used among the NTLM protocols.&lt;BR /&gt;
    - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:00:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258334#M176105</guid>
      <dc:creator>akashjohn</dc:creator>
      <dc:date>2020-09-29T12:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258335#M176106</link>
      <description>&lt;P&gt;Try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=wineventlog ("CORP" AND "svc" AND "failed") NOT "MGMT" | rex max_match=2 "Account Name\s?:\s?(?&amp;lt;AcctName&amp;gt;.*)" | eval AcctName=mvindex(AcctName, -1)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 30 Nov 2016 12:35:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258335#M176106</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-11-30T12:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258336#M176107</link>
      <description>&lt;P&gt;Hi sundareshr,&lt;/P&gt;

&lt;P&gt;Sorry for the communication issue.&lt;/P&gt;

&lt;P&gt;The result which I was mentioned earlier is the result of the query "&lt;STRONG&gt;index=wineventlog ("CORP" AND "svc" AND "failed") NOT MGMT&lt;/STRONG&gt;"&lt;/P&gt;

&lt;P&gt;This value "** svc_mop_svcnow**" will changed for different events. &lt;/P&gt;

&lt;P&gt;What we are looking is for to list out all the values which are coming in place of "&lt;STRONG&gt;svc_mop_svcnow&lt;/STRONG&gt;" with a query. &lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Akash John &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:00:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258336#M176107</guid>
      <dc:creator>akashjohn</dc:creator>
      <dc:date>2020-09-29T12:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258337#M176108</link>
      <description>&lt;P&gt;Try the updated query&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2016 13:21:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258337#M176108</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-11-30T13:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258338#M176109</link>
      <description>&lt;P&gt;Hi sundareshr,&lt;/P&gt;

&lt;P&gt;It throwing an error "Unbalanced quotes.". &lt;/P&gt;

&lt;P&gt;Could you please verify if the query is properly formatted?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2016 13:56:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258338#M176109</guid>
      <dc:creator>akashjohn</dc:creator>
      <dc:date>2016-11-30T13:56:01Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258339#M176110</link>
      <description>&lt;P&gt;Hi Sundarehr,&lt;/P&gt;

&lt;P&gt;I have updated the query as &lt;/P&gt;

&lt;P&gt;index=wineventlog ("CORP" AND "svc" AND "failed") NOT MGMT | rex max_match=2 "Account Name\s?:\s?(?.*") | eval AcctName=mvindex(AcctName, -1)&lt;/P&gt;

&lt;P&gt;and executed, now there is no error showing but the result what we are getting is the old result.. Attaching the same below,&lt;/P&gt;

&lt;P&gt;11/29/16&lt;BR /&gt;
6:33:20.000 PM&lt;BR /&gt;&lt;BR /&gt;
11/29/2016 06:33:20 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4625&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=prd.test.cop.com&lt;BR /&gt;
TaskCategory=Logon&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=36404036&lt;BR /&gt;
Keywords=Audit Failure&lt;BR /&gt;
Message=An account failed to log on.&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
    Security ID:        NULL SID&lt;BR /&gt;
    Account Name:       -&lt;BR /&gt;
    Account Domain:     -&lt;BR /&gt;
    Logon ID:       0x0&lt;/P&gt;

&lt;P&gt;Logon Type:         3&lt;/P&gt;

&lt;P&gt;Account For Which Logon Failed:&lt;BR /&gt;
    Security ID:        NULL SID&lt;BR /&gt;
    Account Name:       svc_mop_svcnow&lt;BR /&gt;
    Account Domain:     CORP&lt;/P&gt;

&lt;P&gt;Failure Information:&lt;BR /&gt;
    Failure Reason:     Unknown user name or bad password.&lt;BR /&gt;
    Status:         0xC000006D&lt;BR /&gt;
    Sub Status:     0xC0000064&lt;/P&gt;

&lt;P&gt;Process Information:&lt;BR /&gt;
    Caller Process ID:  0x0&lt;BR /&gt;
    Caller Process Name:    -&lt;/P&gt;

&lt;P&gt;Network Information:&lt;BR /&gt;
    Workstation Name:   PRD-SNr-MID-W&lt;BR /&gt;
    Source Network Address: 10.2.2.2&lt;BR /&gt;
    Source Port:        52536&lt;/P&gt;

&lt;P&gt;Detailed Authentication Information:&lt;BR /&gt;
    Logon Process:      NtLmSsp &lt;BR /&gt;
    Authentication Package: NTLM&lt;BR /&gt;
    Transited Services: -&lt;BR /&gt;
    Package Name (NTLM only):   -&lt;BR /&gt;
    Key Length:     0&lt;/P&gt;

&lt;P&gt;This event is generated when a logon request fails. It is generated on the computer where access was attempted.&lt;/P&gt;

&lt;P&gt;The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&lt;/P&gt;

&lt;P&gt;The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).&lt;/P&gt;

&lt;P&gt;The Process Information fields indicate which account and process on the system requested the logon.&lt;/P&gt;

&lt;P&gt;The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&lt;/P&gt;

&lt;P&gt;The authentication information fields provide detailed information about this specific logon request.&lt;BR /&gt;
    - Transited services indicate which intermediate services have participated in this logon request.&lt;BR /&gt;
    - Package name indicates which sub-protocol was used among the NTLM protocols.&lt;BR /&gt;
    - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Akash John &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:00:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258339#M176110</guid>
      <dc:creator>akashjohn</dc:creator>
      <dc:date>2020-09-29T12:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258340#M176111</link>
      <description>&lt;P&gt;Fixed typo&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2016 14:38:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258340#M176111</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-11-30T14:38:27Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258341#M176112</link>
      <description>&lt;P&gt;Ok, thanks but I am getting the same out put which i have pasted in the first post. That means&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;11/29/16&lt;BR /&gt;
6:33:20.000 PM&lt;BR /&gt;&lt;BR /&gt;
11/29/2016 06:33:20 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4625&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=prd.test.cop.com&lt;BR /&gt;
TaskCategory=Logon&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=36404036&lt;BR /&gt;
Keywords=Audit Failure&lt;BR /&gt;
Message=An account failed to log on.&lt;BR /&gt;
Subject:&lt;BR /&gt;
    Security ID:        NULL SID&lt;BR /&gt;
    Account Name:       -&lt;BR /&gt;
    Account Domain:     -&lt;BR /&gt;
    Logon ID:       0x0&lt;BR /&gt;
Logon Type:         3&lt;BR /&gt;
Account For Which Logon Failed:&lt;BR /&gt;
    Security ID:        NULL SID&lt;BR /&gt;
    Account Name:       svc_mop_svcnow&lt;BR /&gt;
    Account Domain:     CORP&lt;BR /&gt;
Failure Information:&lt;BR /&gt;
    Failure Reason:     Unknown user name or bad password.&lt;BR /&gt;
    Status:         0xC000006D&lt;BR /&gt;
    Sub Status:     0xC0000064&lt;BR /&gt;
Process Information:&lt;BR /&gt;
    Caller Process ID:  0x0&lt;BR /&gt;
    Caller Process Name:    -&lt;BR /&gt;
Network Information:&lt;BR /&gt;
    Workstation Name:   PRD-SNr-MID-W&lt;BR /&gt;
    Source Network Address: 10.2.2.2&lt;BR /&gt;
    Source Port:        52536&lt;BR /&gt;
Detailed Authentication Information:&lt;BR /&gt;
    Logon Process:      NtLmSsp &lt;BR /&gt;
    Authentication Package: NTLM&lt;BR /&gt;
    Transited Services: -&lt;BR /&gt;
    Package Name (NTLM only):   -&lt;BR /&gt;
    Key Length:     0&lt;BR /&gt;
This event is generated when a logon request fails. It is generated on the computer where access was attempted.&lt;BR /&gt;
The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&lt;BR /&gt;
The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).&lt;BR /&gt;
The Process Information fields indicate which account and process on the system requested the logon.&lt;BR /&gt;
The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&lt;BR /&gt;
The authentication information fields provide detailed information about this specific logon request.&lt;BR /&gt;
    - Transited services indicate which intermediate services have participated in this logon request.&lt;BR /&gt;
    - Package name indicates which sub-protocol was used among the NTLM protocols.&lt;BR /&gt;
    - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:57:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258341#M176112</guid>
      <dc:creator>akashjohn</dc:creator>
      <dc:date>2020-09-29T11:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258342#M176113</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;As a hint: you should install the "Splunk_TA_windows". This TA will extract and normalize field the userID from your windows eventlogs. &lt;/P&gt;

&lt;P&gt;Your query will be easier, as you can ask splunk with a search like "&lt;STRONG&gt;tag=authentication user=myuser&lt;/STRONG&gt;" and you will be able to corelate events.&lt;/P&gt;

&lt;P&gt;Regards,&lt;/P&gt;

&lt;P&gt;Andreas&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:57:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258342#M176113</guid>
      <dc:creator>schose</dc:creator>
      <dc:date>2020-09-29T11:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk query to fetch a particular string  from lot of data output</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258343#M176114</link>
      <description>&lt;P&gt;Hi Andreas,&lt;/P&gt;

&lt;P&gt;Ok, that I will check with the engineers. Could you please let us know is there any other method available to extract data without Splunk_TA_windows? &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:01:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-query-to-fetch-a-particular-string-from-lot-of-data/m-p/258343#M176114</guid>
      <dc:creator>akashjohn</dc:creator>
      <dc:date>2020-09-29T12:01:19Z</dc:date>
    </item>
  </channel>
</rss>

