This method worked for me on an Windows Event log where "Account Name:" appears twice on every event and I only wanted the 2nd name, not the first. The only oddity unresolved was when one of the two names were null in the event. There might be a way to fix that. Other than that, it worked. index=* host=*servername* password EventCode=4625 | rex field=Message "Account Name:\s+(?<ACCOUNT_NAME>[^\r\n]+)" max_match=0 | eval Account_Name_1=mvindex(Account_Name, 0) | eval Account_Name_2=mvindex(Account_Name, 1) | table DomainController, Account_Name_2
... View more