Splunk Search

rex expression

pil321
Communicator

I need to extract the account name from this snippet of a Windows security event log:

Account For Which Logon Failed:
    Security ID: NULL SID
    Account Name: Joe User
    Account Domain: Some.Domain

This is the expression I'm using:

rex "Failed:\s+.*\s+Account\sName:\s+(?<TargetAccount>\S+)\s"

Which gives me this result:

 TargetAccount
          Joe

How do I account for the white space to get the rest of the account name to show up in the result?

Tags (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

modify your regex in this way

Failed:\s+.*\s+Account\sName:\s+(?<TargetAccount>.*)

verify it on https://regex101.com/
Bye.
Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

modify your regex in this way

Failed:\s+.*\s+Account\sName:\s+(?<TargetAccount>.*)

verify it on https://regex101.com/
Bye.
Giuseppe

0 Karma

sundareshr
Legend

Try this

.... | rex "Name:\s(?<TargetAccount>[^\n\r]+)"

MuS
SplunkTrust
SplunkTrust

upvoted, because the regex is matching faster 😉

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...