Splunk Enterprise

dovecot Logs

siemsplunk
Explorer

Hello team,

Am working with dovecot logs-- it's a mail logs.

I managed to integrate it with Splunk through syslog.

it gives me the logs in this format (Attached screenshot)

Now, I want to create a new field to have value of to/receiver
From the screenshot the value of to/receiver is in lda(value)

NOTE: on the below screenshot I dont have to/receiver values i just have from/sender and subject

siemsplunk_0-1721797503738.png

 

Help me please !


0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

You can do inline extraction with rex, e.g.

| rex "lda\((?<to>[^\)]*)\)"

which will extract a new field called to from the portion between the brackets 

You can also set this up as a field extraction - see Fields->Field Extractions and create a new field extraction there using the regex above and then, if lda(xxx) exists in your data, you will get a field called to

 

View solution in original post

0 Karma

bowesmana
SplunkTrust
SplunkTrust

You can do inline extraction with rex, e.g.

| rex "lda\((?<to>[^\)]*)\)"

which will extract a new field called to from the portion between the brackets 

You can also set this up as a field extraction - see Fields->Field Extractions and create a new field extraction there using the regex above and then, if lda(xxx) exists in your data, you will get a field called to

 

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...