Splunk Search

Windows Security Logs: Regex Filtering Search time

arrowsmith3
Path Finder

I have a windows security event that I am trying to extract a custom field for failed logon events. The problem I have is there are two duplicate categories and the text I am after is in the second category:

Ex:
Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
Account For Which Logon Failed:
Security ID: S-1-0-0
Account Name: PCVS Operator
Account Domain: PCVSB681-2

Normally I would just put in rex "Account Name:(?.+)" to extract the content of this field but since there is two of them, is there a way to skip the first field and go directly to the second?

Thanks!

Tags (3)
0 Karma
1 Solution

arrowsmith3
Path Finder

This resolved my question, thanks goes to ziegfried.

rex "(?ms)Account For Which Logon Failed.+?Account Name:\s+(?\V+)"

View solution in original post

0 Karma

arrowsmith3
Path Finder

This resolved my question, thanks goes to ziegfried.

rex "(?ms)Account For Which Logon Failed.+?Account Name:\s+(?\V+)"

0 Karma

arrowsmith3
Path Finder

Thank you but that didnt work, when I apply that to my search string it will list the entire content of the event.

Any other suggestions?

0 Karma

_d_
Splunk Employee
Splunk Employee

Try this:

| rex "(?ms)Account Name.*Account Name:(?<account>.+)"

Hope it helps.

> please upvote and accept answer if you find it useful - thanks!

Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...