Splunk Search

how to get domain name, domain user name from active directory logs

seetharamanPr
New Member

how to get domain name, domain user name from active directory logs

11/22/2016 04:15:20 PM
LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4634
EventType=0
Type=Information
ComputerName=RIYSVSYM-006.KAMC-RD.ngha.med
TaskCategory=Logoff
OpCode=Info
RecordNumber=23190529
Keywords=Audit Success
Message=An account was logged off.

Subject:
Security ID: KAMC-RD\Binshbreenab
Account Name: Binshbreenab
Account Domain: KAMC-RD
Logon ID: 0x322998008

Logon Type: 3

Regards
Pradeep

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi seetharamanPr,
your regex is (?ms)Account Name:\s(?<Name>\w*)\nAccount Domain:\s(?<Domain>.*)\nLogon\sID:\s(?<Logon_ID>\w*)
as you can see at https://regex101.com/r/Wmrdhy/1
Bye.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...