Splunk Search

Trying to extract fields using regex

manojsrms
Engager

Hi, 

I am new to Splunk environment. 

I am trying to extract ModifiedAccountName, ModifiedAccountDomain, ModifiedLogonID and ModifiedLogonType using following regex--

Regex

^(?msi)^EventCode=4634[^0-9].*Account\sName:\s+(?<ModifiedAccountName>[a-z0-9]+[\$]).*Account\sDomain:\s+(?<ModifiedAccountDomain>[a-z]+).*Logon\sID:\s+(?<ModifiedLogonID>[A-Z0-9]+).*Logon\sType:\s+(?<ModifiedLogonType>[\d]+)$

Where raw Log is --

SourceName=Microsoft Windows security auditing.
EventCode=4634
EventType=0
Type=Information
ComputerName=abc1.abc.aa.abc
TaskCategory=Logoff
OpCode=Info
RecordNumber=12232
Keywords=Audit Success
Message=An account was logged off.

Subject:
Security ID: ABC\A12345F123$
Account Name: A123B126$
Account Domain: ABC
Logon ID: 0xA01234C

Logon Type: 5

Getting error "Error in 'rex' command: The regex '_raw' does not extract anything. It should specify at least one named group. Format: (?<name>...)." while executing below Splunk search query ---

index=*windows* |rex field=_raw "^(?msi)^EventCode=4634[^0-9].*Account\sName:\s+(?<ModifiedAccountName>[a-z0-9]+[\$]).*Account\sDomain:\s+(?<ModifiedAccountDomain>[a-z]+).*Logon\sID:\s+(?<ModifiedLogonID>[A-Z0-9]+).*Logon\sType:\s+(?<ModifiedLogonType>[\d]+)$"

Please advise. 

Thanks in advance. 

Labels (5)

bowesmana
SplunkTrust
SplunkTrust

Your regex starts and ends with ^ and $ so it will never match your _raw field as you are looking for

^(?msi)^EventCode=4634...

and your event starts with SourceName=... not EventCode

You don't need double ^^ at the start either. So do either

^(?msi)SourceName=[\w\s\.]+EventCode=4634...
OR
(?msi)EventCode=4634...

 

manjunathmeti
Champion

hi @manojsrms,

Try running rex separately:

index=*windows*
| rex "Account\sName:\s+(?<ModifiedAccountName>[\w]+[\$])" 
| rex "Account\sDomain:\s+(?<ModifiedAccountDomain>[\w]+)" 
| rex "Logon\sID:\s+(?<ModifiedLogonID>[\w]+)"
| rex "Logon\sType:\s+(?<ModifiedLogonType>[\d]+)"

 

If this reply helps you, a like would be appreciated.

Get Updates on the Splunk Community!

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...

Stay Connected: Your Guide to July Tech Talks, Office Hours, and Webinars!

What are Community Office Hours?Community Office Hours is an interactive 60-minute Zoom series where ...