Splunk Search

Regex to extract words in red?

KhalidSheikh
Engager

While processing an AS request for target service krbtgt, the account XXX-G-Dashboard-Dev did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of 1). The requested etypes : 18 17 3. The accounts available etypes : 23. Changing or resetting the password of XXX-G-Dashboard-Dev will generate a proper key.

What is the regex to extract words in red? Thanks.

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex "(?<service>krbtgt)"
| rex "(?<account>XXX-G-Dashboard-Dev)"

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| rex "(?<service>krbtgt)"
| rex "(?<account>XXX-G-Dashboard-Dev)"

richgalloway
SplunkTrust
SplunkTrust

This should do, at least with the sample event.

| rex "target service (?<targetService>[^,]+), the account (?<account>\S+)"
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...