Hello,
Thanks for you help
I tried the regex code but not returning the desire result if will be nice if we can do via regex
This give back all the information
index="wineventlog" EventCode=2889
when I add the regex to this still the same info not sure if this makes the difference all the information is
under "Message" field we just need to pull from Message and one "ComputerName= server001" field from top
1st line is header and below will be data
Client IP address: Identity the client attempted to authenticate as: ComputerName
10.10.00.10 Test\SVC_testLDAP server001
Message=The following client performed a SASL (Negotiate/Kerberos/NTLM/Digest) LDAP bind without requesting signing (integrity verification), or performed a simple bind over a clear text (non-SSL/TLS-encrypted) LDAP connection.
Client IP address:
10.10.00.10:34567
Identity the client attempted to authenticate as:
Test\SVC_testLDAP
Binding Type: 3
else i will try Splunk Filed Extraction
thanks again for help
... View more