<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Index emails to splunk in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/570938#M101167</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;Thanks for your prompt response....&lt;/P&gt;&lt;P&gt;We have Oracle OEM sending out error messages via emails to some users and we need a splunk specific account which can be added on this mail. So we would need to ingest actual mail body as they contain info about Oracle alerts.&lt;/P&gt;&lt;P&gt;These users have domain/NT account email IDs (O365).&lt;/P&gt;&lt;P&gt;Need help regarding what app to use compatible with splunk 8.0.0 and some details of how to set it up.&lt;/P&gt;&lt;P&gt;xxxxxxxxxxxxxxxxxxxSAMPLE MAILxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;From: 13 C Oracle EM Notifications&lt;BR /&gt;Sent: Tuesday, September 28, 2021 10:22 AM&lt;BR /&gt;To: X.Y@abc.com&lt;BR /&gt;Subject: EM Event: Critical:bwprod - SQL running For Long TIme: UserInfo = Inst: 3\,SID:2338 \, OSUSER:xxxxxx-yyyy \, machine:US*******\, sql_id:2ptaaaaaaaaaaaaar Time(in mins) = 76&lt;/P&gt;&lt;P&gt;Host=us**********&lt;BR /&gt;Target type=Cluster Database&lt;BR /&gt;Target name=bwprod2&lt;BR /&gt;Categories=Performance&lt;BR /&gt;Message=SQL running For Long TIme: UserInfo = Inst: 3\,SID:2338 \, OSUSER:xxxxxx-yyyy \, machine:US*******\, sql_id:2ptaaaaaaaaaaaaar Time(in mins) = 76&lt;BR /&gt;Severity=Critical&lt;BR /&gt;Event reported time=Sep 28, 2021 10:22:13 AM EDT&lt;BR /&gt;Operating System=Linux&lt;BR /&gt;Platform=x86_64&lt;BR /&gt;Associated Incident Id=3777777&lt;BR /&gt;Associated Incident Status=New&lt;BR /&gt;Associated Incident Owner=&lt;BR /&gt;Associated Incident Acknowledged By Owner=No&lt;BR /&gt;Associated Incident Priority=None&lt;BR /&gt;Associated Incident Escalation Level=0&lt;BR /&gt;Event Type=Metric Alert&lt;BR /&gt;Event name=ME$Long_running_queries:Elapsed_Time_mins&lt;BR /&gt;Metric Group=ME$Long_running_queries&lt;BR /&gt;Metric=Elapsed_Time_mins&lt;BR /&gt;Metric value=76&lt;BR /&gt;Key Value=Inst: 3\,SID:2338 \, OSUSER:xxxxxx-yyyy \, machine:US*******\, sql_id:2ptaaaaaaaaaaaaar Time(in mins) = 76&lt;BR /&gt;Key Column 1=Userinfo&lt;BR /&gt;Rule Name=xxxxxxxxxxxxxxx&lt;BR /&gt;Rule Owner=xyxyxyxyx&lt;BR /&gt;Update Details:&lt;BR /&gt;SQL running For Long TIme: UserInfo = Inst: 3\,SID:2338 \, OSUSER:xxxxxx-yyyy \, machine:US*******\, sql_id:2ptaaaaaaaaaaaaar Time(in mins) = 76&lt;BR /&gt;Incident created by rule (Name = Incident management rule set for all targets, Create incident for critical metric alerts [System generated rule]).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Neerav&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 Oct 2021 10:26:42 GMT</pubDate>
    <dc:creator>neeravmathur</dc:creator>
    <dc:date>2021-10-14T10:26:42Z</dc:date>
    <item>
      <title>Index emails to splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/570921#M101163</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;We have a requirement where we need to index emails&amp;nbsp; to be ingested into splunk. I know a couple of apps are out there but I could not get them working...also not sure how to setup/request a mail account for splunk specifically for this purpose like what all settings should be applied etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am a novice as far as mail settings are concerned, so can someone take some time and help me out here and be as detailed as possible...We are using Splunk 8.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Neerav&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 09:09:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/570921#M101163</guid>
      <dc:creator>neeravmathur</dc:creator>
      <dc:date>2021-10-14T09:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Index emails to splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/570923#M101164</link>
      <description>&lt;P&gt;Firstly, you should ask yourself what do you mean by "index emails". You want to have raw email headers in your splunk indexes? Email bodies? Some form of a header "extract"?&lt;/P&gt;&lt;P&gt;Secondly - where do you have or can have the emails that you want to perform indexing on? Do you have some account in Exchange that you want to pull the emails from? Or do you want to do indexing on all emails coming into your postfix/exim/whatever server? Do you want to process emails for a particular user or emails for all users?&lt;/P&gt;&lt;P&gt;Answers to those two questions should point you towards a reasonable solution.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 09:19:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/570923#M101164</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2021-10-14T09:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: Index emails to splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/570938#M101167</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;Thanks for your prompt response....&lt;/P&gt;&lt;P&gt;We have Oracle OEM sending out error messages via emails to some users and we need a splunk specific account which can be added on this mail. So we would need to ingest actual mail body as they contain info about Oracle alerts.&lt;/P&gt;&lt;P&gt;These users have domain/NT account email IDs (O365).&lt;/P&gt;&lt;P&gt;Need help regarding what app to use compatible with splunk 8.0.0 and some details of how to set it up.&lt;/P&gt;&lt;P&gt;xxxxxxxxxxxxxxxxxxxSAMPLE MAILxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;From: 13 C Oracle EM Notifications&lt;BR /&gt;Sent: Tuesday, September 28, 2021 10:22 AM&lt;BR /&gt;To: X.Y@abc.com&lt;BR /&gt;Subject: EM Event: Critical:bwprod - SQL running For Long TIme: UserInfo = Inst: 3\,SID:2338 \, OSUSER:xxxxxx-yyyy \, machine:US*******\, sql_id:2ptaaaaaaaaaaaaar Time(in mins) = 76&lt;/P&gt;&lt;P&gt;Host=us**********&lt;BR /&gt;Target type=Cluster Database&lt;BR /&gt;Target name=bwprod2&lt;BR /&gt;Categories=Performance&lt;BR /&gt;Message=SQL running For Long TIme: UserInfo = Inst: 3\,SID:2338 \, OSUSER:xxxxxx-yyyy \, machine:US*******\, sql_id:2ptaaaaaaaaaaaaar Time(in mins) = 76&lt;BR /&gt;Severity=Critical&lt;BR /&gt;Event reported time=Sep 28, 2021 10:22:13 AM EDT&lt;BR /&gt;Operating System=Linux&lt;BR /&gt;Platform=x86_64&lt;BR /&gt;Associated Incident Id=3777777&lt;BR /&gt;Associated Incident Status=New&lt;BR /&gt;Associated Incident Owner=&lt;BR /&gt;Associated Incident Acknowledged By Owner=No&lt;BR /&gt;Associated Incident Priority=None&lt;BR /&gt;Associated Incident Escalation Level=0&lt;BR /&gt;Event Type=Metric Alert&lt;BR /&gt;Event name=ME$Long_running_queries:Elapsed_Time_mins&lt;BR /&gt;Metric Group=ME$Long_running_queries&lt;BR /&gt;Metric=Elapsed_Time_mins&lt;BR /&gt;Metric value=76&lt;BR /&gt;Key Value=Inst: 3\,SID:2338 \, OSUSER:xxxxxx-yyyy \, machine:US*******\, sql_id:2ptaaaaaaaaaaaaar Time(in mins) = 76&lt;BR /&gt;Key Column 1=Userinfo&lt;BR /&gt;Rule Name=xxxxxxxxxxxxxxx&lt;BR /&gt;Rule Owner=xyxyxyxyx&lt;BR /&gt;Update Details:&lt;BR /&gt;SQL running For Long TIme: UserInfo = Inst: 3\,SID:2338 \, OSUSER:xxxxxx-yyyy \, machine:US*******\, sql_id:2ptaaaaaaaaaaaaar Time(in mins) = 76&lt;BR /&gt;Incident created by rule (Name = Incident management rule set for all targets, Create incident for critical metric alerts [System generated rule]).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Neerav&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 10:26:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/570938#M101167</guid>
      <dc:creator>neeravmathur</dc:creator>
      <dc:date>2021-10-14T10:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: Index emails to splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/570969#M101173</link>
      <description>&lt;P&gt;OK. I can tell you what I would do.&lt;/P&gt;&lt;P&gt;Firstly, you have to make sure that your emails are delivered to a specific account. Whether you can do it on the sender's side by defining additional recipient or you have to add additional rules in your mail server - that's outside of the scope of this forum and it's up to your admins &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The rest depends heavily on your email infrastructure. I don't think there's any ready-made app for pulling emails from any pop3 or imap service so it all have to be written from scratch.&lt;/P&gt;&lt;P&gt;There are generally two approaches you can take:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;deliver emails for this account to a specific machine on which you'll run a script be means of procmail or similar software, which will extract the body from the mail message, possibly filter it and convert a little and finally either write to a file from which it would be picked up by UF or send it to a splunk input (possibly HEC).&lt;/LI&gt;&lt;LI&gt;have a script run on schedule (cron on linux machine, task scheduler on windows) that will connect to your email account by means of POP3, IMAP, MAPI or any other mechanism that you use in your company, retrieve new mails, transform them, filter and write to a file or send to an input.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Unfortunately, since it's a very uncommon mode of providing the events for splunk, I'm afraid you'll have to write everything from scratch.&lt;/P&gt;&lt;P&gt;Are you sure there's no other way of delivering those events to splunk? Some log files? Syslog?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 12:34:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/570969#M101173</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2021-10-14T12:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: Index emails to splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/573161#M101383</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;After a long discussion we have decided to use an IMAP based shared mail box where splunk user will have access and use the app-TA-mailclient to ingest the mails. Will let you know about the progress.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 14:11:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Index-emails-to-splunk/m-p/573161#M101383</guid>
      <dc:creator>neeravmathur</dc:creator>
      <dc:date>2021-11-01T14:11:38Z</dc:date>
    </item>
  </channel>
</rss>

