Splunk Search

Regex for normalizing VERP styled e-mail addresses

Simon
Contributor

Hi all

For better bounce handling, we're using VERP styled from-addresses when sending mails through our postfix. So when splunk parses the mail logs, I have values in the from-field like this:

from=<bounce+baAABNQIIAAAAAMAAAARZXNEA@newsletter.domain.com>

Now I'm searching for a regex for search time extraction to remove the VERP id (all after the +).

I tried to use a lookahead ?=, which when matches doesn't get added to the whole mach:

\<(?<realfrom>[a-zA-Z]+(?=\+{1}[a-zA-Z]+)@.*)\>

But this didn't work so far. Any ideas how to get rid of the VERP id?

Thanks Simon

1 Solution

ziegfried
Influencer

The only valid option I can think of is to use the rex command with mode=sed to eliminate this part from the email address:

... | rex field=mail mode=sed "s/\+\w+@/@/g"

View solution in original post

ziegfried
Influencer

The only valid option I can think of is to use the rex command with mode=sed to eliminate this part from the email address:

... | rex field=mail mode=sed "s/\+\w+@/@/g"

Simon
Contributor

Thanks, seems like there's no other possibility.
I also got an answer from support that splunk doesn't replace more than one matching group in transforms.conf

0 Karma

ftk
Motivator

You should be able to do this:

rex "\<(?<realfrom>\S+)\+\w+@"

I tested this with this search on my system:

* | head 1 | eval blah="from=<bounce+baAABNQIIAAAAAMAAAARZXNEA@newsletter.domain.com>" | rex field=blah "\<(?<realfrom>\S+)\+\w+@" | table blah realfrom
0 Karma

ftk
Motivator

Oh ok. In that case ziegfried is right, you'll want to use rex in sed mode.

0 Karma

Simon
Contributor

Hey, thanks for your answer, but it's important that I get the domain name (newsletter.domain.com) in my match too. Only using the username of the email address for identifying senders is not distinct enough.

0 Karma
Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...