<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search- Removed/Added in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-Removed-Added/m-p/104471#M27066</link>
    <description>&lt;OL&gt;
&lt;LI&gt;Is Eventcode a field or a string?&amp;nbsp; You are treating it as a string.&amp;nbsp; If it is a field and not a string, your search won't work&lt;/LI&gt;
&lt;LI&gt;Make sure you are getting the _raw data you expect after your search criteria.&amp;nbsp; Your rex for &lt;ACTION&gt; is suspect as it doesn't match the case used in the search.&lt;/ACTION&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;To Ayn's point, what data are you working with and what are you trying to do?&lt;/P&gt;</description>
    <pubDate>Sun, 22 Jul 2012 20:30:51 GMT</pubDate>
    <dc:creator>chrismorris</dc:creator>
    <dc:date>2012-07-22T20:30:51Z</dc:date>
    <item>
      <title>Search- Removed/Added</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Removed-Added/m-p/104468#M27063</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;index="Server" ( CategoryString="Account Management" OR TaskCategory="Security Group Management" ) (Message="Security Enabled*" OR Message="A member was added to a*" OR Message="A member was removed from a*") ("EventCode=624" OR "EventCode=630" OR "EventCode=4720" OR "Eventcode=4726")  | eval caller = if(isnull(Account_Name), Caller_User_Name, mvindex(Account_Name,0)) | eval member = if(isnull(Account_Name), Member_Name, mvindex(Account_Name,1)) | eval group = if(isnull(Target_Account_Name), Group_Name, Target_Account_Name) | rex field=_raw "CN=(?&amp;lt;cname&amp;gt;.+?)," | rex field=_raw "Message=A security-enabled .* was (?&amp;lt;action&amp;gt;.+?)\." | rex field=_raw "was (?&amp;lt;details&amp;gt;\S+)"| table _time host caller details cname| rename _time AS Date/Time cname AS User group AS Group caller AS "Initiator" name AS "Description" host AS "DC" Security_ID AS "Initiator" details AS Action | convert timeformat="%m/%d/%Y %H:%M:%S %p" ctime(Date/Time)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I can not get the removed field to work, when i put the proper event codes that I want. Does anyone have any suggestions? &lt;/P&gt;</description>
      <pubDate>Fri, 20 Jul 2012 17:19:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Removed-Added/m-p/104468#M27063</guid>
      <dc:creator>Michael_Schyma1</dc:creator>
      <dc:date>2012-07-20T17:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: Search- Removed/Added</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Removed-Added/m-p/104469#M27064</link>
      <description>&lt;P&gt;It's kind of hard to read your questions - it's a search consisting of 10 dense lines, followed by a very short text about something that does not work. Please include more detail on your use-case, what the desired outcome is, what results you are getting instead and any other details that might help us help you.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jul 2012 19:31:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Removed-Added/m-p/104469#M27064</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-07-20T19:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Search- Removed/Added</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Removed-Added/m-p/104470#M27065</link>
      <description>&lt;P&gt;Agreed... where is your "removed" field meant to be used, the string "removed" is only mentioned once in your search syntax, and that is part of the initial search command.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jul 2012 15:47:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Removed-Added/m-p/104470#M27065</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2012-07-21T15:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: Search- Removed/Added</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Removed-Added/m-p/104471#M27066</link>
      <description>&lt;OL&gt;
&lt;LI&gt;Is Eventcode a field or a string?&amp;nbsp; You are treating it as a string.&amp;nbsp; If it is a field and not a string, your search won't work&lt;/LI&gt;
&lt;LI&gt;Make sure you are getting the _raw data you expect after your search criteria.&amp;nbsp; Your rex for &lt;ACTION&gt; is suspect as it doesn't match the case used in the search.&lt;/ACTION&gt;&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;To Ayn's point, what data are you working with and what are you trying to do?&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jul 2012 20:30:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Removed-Added/m-p/104471#M27066</guid>
      <dc:creator>chrismorris</dc:creator>
      <dc:date>2012-07-22T20:30:51Z</dc:date>
    </item>
  </channel>
</rss>

