Splunk Search

Double value in field

keyu921
Explorer

I am searching windows event log.

Aftre result search complete, Account_Domain contains following value

"-
ABC"

How can I left ABC inside??

| rex field="Account_Domain" mode=sed "s/([0-9]{4}) /\1,,/" not working

0 Karma
1 Solution

vnravikumar
Champion

Hi

Check this

| rex field=Account_Domain max_match=0 "(?P<Account_Domain>\w+)"

View solution in original post

0 Karma

vnravikumar
Champion

Hi

Check this

| rex field=Account_Domain max_match=0 "(?P<Account_Domain>\w+)"
0 Karma

keyu921
Explorer
Become like this

Account_Domain

ALPHA

ALPHA

0 Karma

vnravikumar
Champion

Can you provide some sample data with the expected output?

0 Karma
Get Updates on the Splunk Community!

See Splunk Platform & Observability Innovations at Cisco Live EMEA

Hi Splunkers, Learn about what’s next for Splunk Platform at Cisco Live EMEA.  Data silos are a big challenge ...

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...