I am struggling to find a text string - "TargetUserName" using SPLUNK. I have drilled down to the actual event log in question and can't get SPLUNK to display any of the data in the Event log General tab.
Could someone please advise how I can filter on TargetUserName
To find a value of the field TargetUserName that is equal to Dave121:
To search for Dave121 as plain text:
If for some reason Splunk is not finding that TargetUserName is a field, then the second option should work. If you are searching Windows event logs, most of the time the username is in the User_Name or Account_Name fields. If you still are unable to find what you are looking for, please post a copy of the event.