<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Newb - Searching within account_name field of event log in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67029#M180462</link>
    <description>&lt;P&gt;Try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="WinEventLog:Security" Account_Name="*fire*"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 18 Jun 2013 15:58:06 GMT</pubDate>
    <dc:creator>JSapienza</dc:creator>
    <dc:date>2013-06-18T15:58:06Z</dc:date>
    <item>
      <title>Newb - Searching within account_name field of event log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67027#M180460</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I am trying to search the windows security log for any logs where account_name field contains fire (case insensitive).&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sourcetype="WinEventLog:Security" regex Account_Name="/(\w{1,20})?fire(\w{1,20})?/i"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;I am using the above search, but it doesn't work.  Yet there are accounts which have fire in the name such as Firetestadmin or bluefire123, and there are events for this search.&lt;/P&gt;

&lt;P&gt;What am I doing wrong pls?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2013 15:11:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67027#M180460</guid>
      <dc:creator>bkeeley</dc:creator>
      <dc:date>2013-06-18T15:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: Newb - Searching within account_name field of event log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67028#M180461</link>
      <description>&lt;P&gt;How about:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="WinEventLog:Security"  | rex "(?i)Account Name:\s+(?&amp;lt;a_fire_account&amp;gt;.*fire.*)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I recommend that you download the Splunk for Windows technology add-on:&lt;BR /&gt;
&lt;A href="http://splunk-base.splunk.com/apps/28933/splunk-for-windows-technology-add-on"&gt;http://splunk-base.splunk.com/apps/28933/splunk-for-windows-technology-add-on&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;It does field extractions in windows events for you (so you don't have to worry about rex to much)&lt;/P&gt;

&lt;P&gt;Then you can search as follows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="WinEventLog:Security" Account_Name="*fire*"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 18 Jun 2013 15:57:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67028#M180461</guid>
      <dc:creator>chris</dc:creator>
      <dc:date>2013-06-18T15:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Newb - Searching within account_name field of event log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67029#M180462</link>
      <description>&lt;P&gt;Try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="WinEventLog:Security" Account_Name="*fire*"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 18 Jun 2013 15:58:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67029#M180462</guid>
      <dc:creator>JSapienza</dc:creator>
      <dc:date>2013-06-18T15:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Newb - Searching within account_name field of event log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67030#M180463</link>
      <description>&lt;P&gt;Looks like chris beat me to it..&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2013 15:59:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67030#M180463</guid>
      <dc:creator>JSapienza</dc:creator>
      <dc:date>2013-06-18T15:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: Newb - Searching within account_name field of event log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67031#M180464</link>
      <description>&lt;P&gt;Excellent - Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2013 16:05:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67031#M180464</guid>
      <dc:creator>bkeeley</dc:creator>
      <dc:date>2013-06-18T16:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: Newb - Searching within account_name field of event log</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67032#M180465</link>
      <description>&lt;P&gt;Thanks anyway &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2013 16:05:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Newb-Searching-within-account-name-field-of-event-log/m-p/67032#M180465</guid>
      <dc:creator>bkeeley</dc:creator>
      <dc:date>2013-06-18T16:05:54Z</dc:date>
    </item>
  </channel>
</rss>

