Splunk Enterprise

regex to extract fields

shugup2923
Path Finder

My message field look likes below
Message=network share object was checked to see whether client can be granted desired access. Subject: Security ID: EMEA\xxxx.xxxxxx Account Name: xxxx.xxxxxxx Account Domain: EMEA Logon ID: xxxxxxxxxx Network Information: Object Type: File Source Address: xx.xx.xx.xxx Source Port: xxxxx Share Information: Share Name: \*\XX_XX_6_1

I need regex for extracting Security ID, Account Name , Account Domain from this fields,

Tags (1)
0 Karma

jpolvino
Builder

Here is one way to do it:

(your search)
| rex "Security ID: (?<security_id>[\S]+) Account Name: (?<account_name>[\S]+) Account Domain: (?<account_domain>[\S]+)"

See regex101: https://regex101.com/r/IJr8wm/1

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...