Quantcast
Channel: Questions in topic: "splunk-enterprise"
Viewing all articles
Browse latest Browse all 47296

rex expression

$
0
0
I need to extract the account name from this snippet of a Windows security event log: Account For Which Logon Failed: Security ID: NULL SID Account Name: Joe User Account Domain: Some.Domain This is the expression I'm using: rex "Failed:\s+.*\s+Account\sName:\s+(?\S+)\s" Which gives me this result: TargetAccount Joe How do I account for the white space to get the rest of the account name to show up in the result?

Viewing all articles
Browse latest Browse all 47296

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>