Splunk Search

Splitting Entries into 2 columns for same field

sharadkapurala
New Member

I need AD auth events and some have multiple entries for Account Name field. One entry is a hyphen (-). Can someone help me build a query to split these into 2 columns, so I can use the entry with the value and not the one with hyphen (-)

Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0X0

Logon Type: 3

Account For which Logon failed:

Security ID: S-1-0-0
Account Name: xyz
Account Domain: domain.local

I need only the Account name information in the event where logon failed. But when I use an eval, am unable to get only 'xyz'

Any help is appreciated.

R
Sharad

0 Karma

TiagoTLD1
Communicator

Is this data of ONE SINGLE EVENT? I mean, you have one event with two Account Name ?

0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...