Splunk Search

Splitting Entries into 2 columns for same field

sharadkapurala
New Member

I need AD auth events and some have multiple entries for Account Name field. One entry is a hyphen (-). Can someone help me build a query to split these into 2 columns, so I can use the entry with the value and not the one with hyphen (-)

Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0X0

Logon Type: 3

Account For which Logon failed:

Security ID: S-1-0-0
Account Name: xyz
Account Domain: domain.local

I need only the Account name information in the event where logon failed. But when I use an eval, am unable to get only 'xyz'

Any help is appreciated.

R
Sharad

0 Karma

TiagoTLD1
Communicator

Is this data of ONE SINGLE EVENT? I mean, you have one event with two Account Name ?

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...

Updated Data Management and AWS GDI Inventory in Splunk Observability

We’re making some changes to Data Management and Infrastructure Inventory for AWS. The Data Management page, ...