<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filtering substring content in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Filtering-substring-content/m-p/577688#M201324</link>
    <description>&lt;P&gt;Are you doing this in a search or dashboard query? If so, try it like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="winevtlog:security" EventCode=4688 | rare limit=50 New_Process_Name | where match(New_Process_Name, "VMware")&lt;/LI-CODE&gt;</description>
    <pubDate>Tue, 07 Dec 2021 19:05:14 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2021-12-07T19:05:14Z</dc:date>
    <item>
      <title>Filtering substring content</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-substring-content/m-p/577685#M201322</link>
      <description>&lt;P&gt;I have a search which looks at rare events in Windows Event Logs and provides output shown below.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;source="winevtlog:security" EventCode=4688 | rare limit=50 New_Process_Name&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log-1.jpg" style="width: 445px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/17142iCBBFE475055F416F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Log-1.jpg" alt="Log-1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I've been unsuccessful in filtering these results further, such as searching for programs running from a Temp folder, or other non-standard folders. Looking under the 'match_regex(input, pattern)' section in the &lt;A href="https://docs.splunk.com/Documentation/DSP/1.2.1/FunctionReference/Stringmanipulation" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/DSP/1.2.1/FunctionReference/Stringmanipulation&lt;/A&gt;&amp;nbsp;documentation has one example, but I'm not able to figure out how to modify the example to fit my search. For example, reducing the search to only show VMware processes. Below is an attempt I made, which gave me:&amp;nbsp;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Error in 'where' command: The expression is malformed. An unexpected character is reached at '/VMware/);'.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;source="winevtlog:security" EventCode=4688 | rare limit=50 New_Process_Name | where match_regex(cast(New_Process_Name, "string"), /VMware/);&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The documentation mentions using the RegEx Start and End characters ^ $, but I get the same error listed above.&amp;nbsp; I've looked at several other posts here below, but haven't been able to find a good example that fits.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/Search-for-a-string-containing-X/m-p/120450" target="_blank" rel="noopener"&gt;https://community.splunk.com/t5/Splunk-Search/Search-for-a-string-containing-X/m-p/120450&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-to-write-a-search-where-if-a-certain-string-is-found-in-a/m-p/136680" target="_blank" rel="noopener"&gt;https://community.splunk.com/t5/Splunk-Search/How-to-write-a-search-where-if-a-certain-string-is-found-in-a/m-p/136680&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-to-match-and-filter-by-substr/m-p/155912#M43866" target="_blank" rel="noopener"&gt;https://community.splunk.com/t5/Splunk-Search/How-to-match-and-filter-by-substr/m-p/155912#M43866&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Dec 2021 18:44:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-substring-content/m-p/577685#M201322</guid>
      <dc:creator>RedHonda03</dc:creator>
      <dc:date>2021-12-07T18:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering substring content</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-substring-content/m-p/577688#M201324</link>
      <description>&lt;P&gt;Are you doing this in a search or dashboard query? If so, try it like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="winevtlog:security" EventCode=4688 | rare limit=50 New_Process_Name | where match(New_Process_Name, "VMware")&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 07 Dec 2021 19:05:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-substring-content/m-p/577688#M201324</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-12-07T19:05:14Z</dc:date>
    </item>
  </channel>
</rss>

