Splunk Search

I am trying to create a field for sudo based on the following log entry

gceraso
Engager

I am trying to extract the username into a field that I can use and have so far been unsuccessful. I am doing this based off the log entries below.

Mar  4 17:20:43 hostname sudo: [ID 702911 local2.notice]    username : TTY=pts/3 ; PWD=/export/home/username ; USER=root ; COMMAND=/usr/bin/su -    
Mar  7 11:44:47 hostname sudo: [ID 702911 local2.notice]   user : TTY=pts/5 ; PWD=/export/home/user ; USER=root ; COMMAND=/usr/bin/su -

I have tried this search and regex but have been unsuccessful. If the username is a different length it won't pick it up. Also, it doesn't seem to pick up all occurrences of the same name either.

sudo "COMMAND=/usr/bin/su"
| rex "(?i)\\.notice\\]   (?P<FIELDNAME>\\w+\\s+:)"
| fields FIELDNAME
| dedup FIELDNAME
Tags (1)
0 Karma

Stephen_Sorkin
Splunk Employee
Splunk Employee

Try something like:

sudo "COMMAND=/usr/bin/su"
| rex "\\]\s+(?<FIELDNAME>\S+)"
| dedup FIELDNAME
0 Karma
Get Updates on the Splunk Community!

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...