Splunk Search

Regex for normalizing VERP styled e-mail addresses

Simon
Contributor

Hi all

For better bounce handling, we're using VERP styled from-addresses when sending mails through our postfix. So when splunk parses the mail logs, I have values in the from-field like this:

from=<bounce+baAABNQIIAAAAAMAAAARZXNEA@newsletter.domain.com>

Now I'm searching for a regex for search time extraction to remove the VERP id (all after the +).

I tried to use a lookahead ?=, which when matches doesn't get added to the whole mach:

\<(?<realfrom>[a-zA-Z]+(?=\+{1}[a-zA-Z]+)@.*)\>

But this didn't work so far. Any ideas how to get rid of the VERP id?

Thanks Simon

1 Solution

ziegfried
Influencer

The only valid option I can think of is to use the rex command with mode=sed to eliminate this part from the email address:

... | rex field=mail mode=sed "s/\+\w+@/@/g"

View solution in original post

ziegfried
Influencer

The only valid option I can think of is to use the rex command with mode=sed to eliminate this part from the email address:

... | rex field=mail mode=sed "s/\+\w+@/@/g"

Simon
Contributor

Thanks, seems like there's no other possibility.
I also got an answer from support that splunk doesn't replace more than one matching group in transforms.conf

0 Karma

ftk
Motivator

You should be able to do this:

rex "\<(?<realfrom>\S+)\+\w+@"

I tested this with this search on my system:

* | head 1 | eval blah="from=<bounce+baAABNQIIAAAAAMAAAARZXNEA@newsletter.domain.com>" | rex field=blah "\<(?<realfrom>\S+)\+\w+@" | table blah realfrom
0 Karma

ftk
Motivator

Oh ok. In that case ziegfried is right, you'll want to use rex in sed mode.

0 Karma

Simon
Contributor

Hey, thanks for your answer, but it's important that I get the domain name (newsletter.domain.com) in my match too. Only using the username of the email address for identifying senders is not distinct enough.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...