Splunk Search

Splitting Entries into 2 columns for same field

sharadkapurala
New Member

I need AD auth events and some have multiple entries for Account Name field. One entry is a hyphen (-). Can someone help me build a query to split these into 2 columns, so I can use the entry with the value and not the one with hyphen (-)

Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0X0

Logon Type: 3

Account For which Logon failed:

Security ID: S-1-0-0
Account Name: xyz
Account Domain: domain.local

I need only the Account name information in the event where logon failed. But when I use an eval, am unable to get only 'xyz'

Any help is appreciated.

R
Sharad

0 Karma

TiagoTLD1
Communicator

Is this data of ONE SINGLE EVENT? I mean, you have one event with two Account Name ?

0 Karma
Get Updates on the Splunk Community!

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...