Splunk Enterprise Security

Searching notable events in ES to match user field

marktechuk
New Member

Folks, I'm trying to match a field (user) from a search to see if any previous notable events ES have been generated for that use and output any match.

Cannot seem to get any output

Tried the below:

index=*** sourcetype=*** category="alerttype"| rex field=fieldWithUserID "(?[^:]+$)" | search [ search notable
| fields user dest
| format "(" "(" "OR" ")" "OR" ")"]

0 Karma
1 Solution

solarboyz1
Builder

I think you are using the subsearch incorrectly:

The [subsearch] finds the users and uses that list as an OR seperated filter in the main search:

index=notable [ index=YOURINDEX  sourcetype=YOURSOURCETYPE category="alerttype"| rex field=fieldWithUserID "(?<user>[^:]+$)" | fields user | dedupe user ]

View solution in original post

0 Karma

marktechuk
New Member

great thanks, got it to work using your search. 5*

0 Karma

solarboyz1
Builder

I think you are using the subsearch incorrectly:

The [subsearch] finds the users and uses that list as an OR seperated filter in the main search:

index=notable [ index=YOURINDEX  sourcetype=YOURSOURCETYPE category="alerttype"| rex field=fieldWithUserID "(?<user>[^:]+$)" | fields user | dedupe user ]
0 Karma
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...