Splunk Search

Double value in field

keyu921
Explorer

I am searching windows event log.

Aftre result search complete, Account_Domain contains following value

"-
ABC"

How can I left ABC inside??

| rex field="Account_Domain" mode=sed "s/([0-9]{4}) /\1,,/" not working

0 Karma
1 Solution

vnravikumar
Champion

Hi

Check this

| rex field=Account_Domain max_match=0 "(?P<Account_Domain>\w+)"

View solution in original post

0 Karma

vnravikumar
Champion

Hi

Check this

| rex field=Account_Domain max_match=0 "(?P<Account_Domain>\w+)"
0 Karma

keyu921
Explorer
Become like this

Account_Domain

ALPHA

ALPHA

0 Karma

vnravikumar
Champion

Can you provide some sample data with the expected output?

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...