Splunk Search

Regex to extract words in red?

KhalidSheikh
Engager

While processing an AS request for target service krbtgt, the account XXX-G-Dashboard-Dev did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of 1). The requested etypes : 18 17 3. The accounts available etypes : 23. Changing or resetting the password of XXX-G-Dashboard-Dev will generate a proper key.

What is the regex to extract words in red? Thanks.

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex "(?<service>krbtgt)"
| rex "(?<account>XXX-G-Dashboard-Dev)"

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| rex "(?<service>krbtgt)"
| rex "(?<account>XXX-G-Dashboard-Dev)"

richgalloway
SplunkTrust
SplunkTrust

This should do, at least with the sample event.

| rex "target service (?<targetService>[^,]+), the account (?<account>\S+)"
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...