Splunk Search

Standardizing Account_Name for Event 4769 to match others?

kearaspoor
SplunkTrust
SplunkTrust

I'm trying to use EventCode 4769 along with several other EventCodes in a search and am running into the problem that for this code all the Account_Name fields contain the fully qualified name (name@domain) while the other fields are just the name. I need to somehow need to get the Account_Name field for this code only, to stop reading at the @ sign.

Any thoughts would be greatly appreciated! Thank you!

Tags (3)
0 Karma
1 Solution

the_wolverine
Champion
| rex field=Account_Name "(?<Account_Name>[^@]+)"

View solution in original post

0 Karma

the_wolverine
Champion
| rex field=Account_Name "(?<Account_Name>[^@]+)"
0 Karma

kearaspoor
SplunkTrust
SplunkTrust

Thank you! That was exactly what I needed!

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...