Splunk Enterprise Security

Searching notable events in ES to match user field

marktechuk
New Member

Folks, I'm trying to match a field (user) from a search to see if any previous notable events ES have been generated for that use and output any match.

Cannot seem to get any output

Tried the below:

index=*** sourcetype=*** category="alerttype"| rex field=fieldWithUserID "(?[^:]+$)" | search [ search notable
| fields user dest
| format "(" "(" "OR" ")" "OR" ")"]

0 Karma
1 Solution

solarboyz1
Builder

I think you are using the subsearch incorrectly:

The [subsearch] finds the users and uses that list as an OR seperated filter in the main search:

index=notable [ index=YOURINDEX  sourcetype=YOURSOURCETYPE category="alerttype"| rex field=fieldWithUserID "(?<user>[^:]+$)" | fields user | dedupe user ]

View solution in original post

0 Karma

marktechuk
New Member

great thanks, got it to work using your search. 5*

0 Karma

solarboyz1
Builder

I think you are using the subsearch incorrectly:

The [subsearch] finds the users and uses that list as an OR seperated filter in the main search:

index=notable [ index=YOURINDEX  sourcetype=YOURSOURCETYPE category="alerttype"| rex field=fieldWithUserID "(?<user>[^:]+$)" | fields user | dedupe user ]
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

Thanks for the Memories! Splunk University, .conf25, and our Community

Thank you to everyone in the Splunk Community who joined us for .conf25, which kicked off with our iconic ...

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...