Splunk Search

REGEX for authentication logs

hartfoml
Motivator

I have authentication logs like below:

,AUTHN_METHOD_FOO,123!@#123!@#123!@#asdfgdvfd,123!@#123!@#123!@#asdfgdvfd,123!@#123!@#123!@#asdfgdvfd,123!@#123!@#123!@#asdfgdvfd,username,FIRST,LAST,

I want to use regex to build transform for a field called username and first and last

I had this but it didn't work

rex "(?i)AUTHN_METHOD_*+,*+,*+,*+,*+,(?P<username>[^,]+)"

Any help would be great!!!

Tags (1)
0 Karma
1 Solution

somesoni2
Revered Legend

Try this

rex "(?i)AUTHN_METHOD_\w+,.*,(?<username>[^,]+),(?<first>[^,]+),(?<last>[^,]+)"

View solution in original post

somesoni2
Revered Legend

Try this

rex "(?i)AUTHN_METHOD_\w+,.*,(?<username>[^,]+),(?<first>[^,]+),(?<last>[^,]+)"

hartfoml
Motivator

Thanks, I have a problem becasue the \w+ could be one work or several like this "SUCCESS_TEMPORARY_FIXED_TOKENCODE" and the .* for the 4 sets of guid numbers seems odd

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...