<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to configure Splunk to index NetApp CIFS logs in XML format? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264556#M50807</link>
    <description>&lt;P&gt;Has anyone had success with getting the NetApp CIFS logs parsed out correctly? I have tried to manually upload one of these xml files on a standalone sandbox server, and was still not able to get all the fields parsed out correctly. I believe the ONTAP 9 documentation says the logs can be written either in xml or evtx file formats. Would these logs be parsed better if they were written in an evtx file format instead of xml&lt;/P&gt;</description>
    <pubDate>Fri, 21 Dec 2018 20:09:27 GMT</pubDate>
    <dc:creator>PranaySompalli</dc:creator>
    <dc:date>2018-12-21T20:09:27Z</dc:date>
    <item>
      <title>How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264546#M50797</link>
      <description>&lt;P&gt;I am having issues configuring Splunk to Index NetApp CIFS logs in XML format.&lt;/P&gt;

&lt;P&gt;Here is an example of 3 events:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;Events xmlns="http://www.netapp.com/schemas/ONTAP/2007/AuditLog"&amp;gt;
&amp;lt;Event&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name="Netapp-Security-Auditing"/&amp;gt;&amp;lt;EventID&amp;gt;4656&amp;lt;/EventID&amp;gt;&amp;lt;EventName&amp;gt;Open Object&amp;lt;/EventName&amp;gt;&amp;lt;Version&amp;gt;101.3&amp;lt;/Version&amp;gt;&amp;lt;Source&amp;gt;CIFS&amp;lt;/Source&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;Result&amp;gt;Audit Success&amp;lt;/Result&amp;gt;&amp;lt;TimeCreated SystemTime="2016-03-24T17:00:18.275811000Z"/&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;4cf616e5-deec-11e5-9347-00a0988f86b6/e64ece12-df28-11e5-9348-00a0988f86b6&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name="SubjectIP" IPVersion="4"&amp;gt;10.10.10.10&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUnix" Uid="0" Gid="1" Local="false"&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserSid"&amp;gt;S-9-9-99-9999999999-999999999-9999999999-9999&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserIsLocal"&amp;gt;false&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectDomainName"&amp;gt;DOMAIN&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserName"&amp;gt;admin&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ObjectServer"&amp;gt;Security&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ObjectType"&amp;gt;Directory&amp;lt;/Data&amp;gt;&amp;lt;Data Name="HandleID"&amp;gt;0000000000041f;00;00000040;5e1fd3f6&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ObjectName"&amp;gt;(name);/&amp;lt;/Data&amp;gt;&amp;lt;Data Name="AccessList"&amp;gt;%%4423 %%1541 &amp;lt;/Data&amp;gt;&amp;lt;Data Name="AccessMask"&amp;gt;10080&amp;lt;/Data&amp;gt;&amp;lt;Data Name="DesiredAccess"&amp;gt;Read Attributes; Synchronize; &amp;lt;/Data&amp;gt;&amp;lt;Data Name="Attributes"&amp;gt;Open a directory; &amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;
&amp;lt;Event&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name="Netapp-Security-Auditing"/&amp;gt;&amp;lt;EventID&amp;gt;4656&amp;lt;/EventID&amp;gt;&amp;lt;EventName&amp;gt;Open Object&amp;lt;/EventName&amp;gt;&amp;lt;Version&amp;gt;101.3&amp;lt;/Version&amp;gt;&amp;lt;Source&amp;gt;CIFS&amp;lt;/Source&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;Result&amp;gt;Audit Success&amp;lt;/Result&amp;gt;&amp;lt;TimeCreated SystemTime="2016-03-24T17:00:18.276812000Z"/&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;4cf616e5-deec-11e5-9347-00a0988f86b6/e64ece12-df28-11e5-9348-00a0988f86b6&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name="SubjectIP" IPVersion="4"&amp;gt;10.10.10.10&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUnix" Uid="0" Gid="1" Local="false"&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserSid"&amp;gt;S-9-9-99-9999999999-999999999-9999999999-9999&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserIsLocal"&amp;gt;false&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectDomainName"&amp;gt;DOMAIN&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserName"&amp;gt;admin&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ObjectServer"&amp;gt;Security&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ObjectType"&amp;gt;Directory&amp;lt;/Data&amp;gt;&amp;lt;Data Name="HandleID"&amp;gt;0000000000041f;00;00000040;5e1fd3f6&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ObjectName"&amp;gt;(name);/&amp;lt;/Data&amp;gt;&amp;lt;Data Name="AccessList"&amp;gt;%%4423 %%1541 &amp;lt;/Data&amp;gt;&amp;lt;Data Name="AccessMask"&amp;gt;10080&amp;lt;/Data&amp;gt;&amp;lt;Data Name="DesiredAccess"&amp;gt;Read Attributes; Synchronize; &amp;lt;/Data&amp;gt;&amp;lt;Data Name="Attributes"&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;
&amp;lt;Event&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name="Netapp-Security-Auditing"/&amp;gt;&amp;lt;EventID&amp;gt;4656&amp;lt;/EventID&amp;gt;&amp;lt;EventName&amp;gt;Open Object&amp;lt;/EventName&amp;gt;&amp;lt;Version&amp;gt;101.3&amp;lt;/Version&amp;gt;&amp;lt;Source&amp;gt;CIFS&amp;lt;/Source&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;Result&amp;gt;Audit Success&amp;lt;/Result&amp;gt;&amp;lt;TimeCreated SystemTime="2016-03-24T17:00:18.561808000Z"/&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;4cf616e5-deec-11e5-9347-00a0988f86b6/e64ece12-df28-11e5-9348-00a0988f86b6&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name="SubjectIP" IPVersion="4"&amp;gt;10.10.10.10&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUnix" Uid="0" Gid="1" Local="false"&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserSid"&amp;gt;S-9-9-99-9999999999-999999999-9999999999-9999&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserIsLocal"&amp;gt;false&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectDomainName"&amp;gt;DOMAIN&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserName"&amp;gt;admin&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ObjectServer"&amp;gt;Security&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ObjectType"&amp;gt;Directory&amp;lt;/Data&amp;gt;&amp;lt;Data Name="HandleID"&amp;gt;0000000000041f;00;00000040;5e1fd3f6&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ObjectName"&amp;gt;(name);/&amp;lt;/Data&amp;gt;&amp;lt;Data Name="AccessList"&amp;gt;%%4423 %%1541 &amp;lt;/Data&amp;gt;&amp;lt;Data Name="AccessMask"&amp;gt;10080&amp;lt;/Data&amp;gt;&amp;lt;Data Name="DesiredAccess"&amp;gt;Read Attributes; Synchronize; &amp;lt;/Data&amp;gt;&amp;lt;Data Name="Attributes"&amp;gt;Open a directory; &amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've attempted to create a props.conf with KV_MODE = xml, but haven't had any success yet.&lt;/P&gt;

&lt;P&gt;Any assistance would be appreciated.&lt;BR /&gt;
Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 01:24:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264546#M50797</guid>
      <dc:creator>nbonner</dc:creator>
      <dc:date>2016-03-30T01:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264547#M50798</link>
      <description>&lt;P&gt;I am able to successfully get Splunk to identify individual events using the following props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[NetApp:Audit]
KV_MODE = xml
TIME_PREFIX = &amp;lt;TimeCreated SystemTime=
MAX_TIMESTAMP_LOOKAHEAD=300
SHOULD_LINEMERGE=true
BREAK_ONLY_BEFORE=^&amp;lt;Event&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Field extraction of the xml is still not working.  This file is on our Search Head &amp;amp; Indexers.  Is there further configuration needed for field extraction of XML?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 17:18:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264547#M50798</guid>
      <dc:creator>nbonner</dc:creator>
      <dc:date>2016-03-30T17:18:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264548#M50799</link>
      <description>&lt;P&gt;I am able to get XML field extraction, but it is delayed by around 3 hours, and the file keeps getting re-indexed (seek chkptr failed match). Here are my props:&lt;/P&gt;

&lt;P&gt;[ontap]&lt;BR /&gt;
TIME_PREFIX = SystemTime=\"&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
LINE_BREAKER = ()&lt;BR /&gt;
MUST_BREAK_AFTER = \&lt;BR /&gt;
KV_MODE = xml&lt;/P&gt;

&lt;P&gt;Make sure you have global permissions on the TA or SA you are setting this in. Here is my metadata/local.meta&lt;/P&gt;

&lt;P&gt;[]&lt;BR /&gt;
access = read : [ * ], write : [ admin, yourothergroup, yourotherothergroup]&lt;BR /&gt;
export = system&lt;/P&gt;

&lt;P&gt;Is anyone getting a re-indexed file issue which leads to a long delay in making the data searchable? Since the files are large, I am assuming the re-indexing is causing the delay in search due to time/field extraction. &lt;BR /&gt;
Here is what I am getting in splunkd.log on the UF:&lt;/P&gt;

&lt;P&gt;ERROR TailReader - File will not be read, seekptr checksum did not match (file=\fileshare\audit_logs$\audit_last.xml).  Last time we saw this initcrc, filename was different.  You may wish to use larger initCrcLen for this sourcetype, or a CRC salt on this source.  Consult the documentation or file a support case online at &lt;A href="http://www.splunk.com/page/submit_issue" target="_blank"&gt;http://www.splunk.com/page/submit_issue&lt;/A&gt; for more info.&lt;/P&gt;

&lt;P&gt;When I use crcSalt =  I get the re-indexing issue, which leads to the delayed search results&lt;BR /&gt;
From splunkd.log on UF&lt;BR /&gt;
tailReader -   ...continuing.&lt;BR /&gt;
05-24-2016 15:50:58.127 -0400 INFO  TailReader - Continuing...&lt;BR /&gt;
05-24-2016 15:51:18.703 -0400 INFO  WatchedFile - Checksum for seekptr didn't match, will re-read entire file='\fileshare\audit_logs$\audit_last.xml'.&lt;BR /&gt;
05-24-2016 15:51:18.704 -0400 INFO  WatchedFile - Will begin reading at offset=0 for file='\fileshare\audit_logs$\audit_last.xml'.&lt;BR /&gt;
05-24-2016 15:51:19.205 -0400 INFO  WatchedFile - Checksum for seekptr didn't match, will re-read entire file='\fileshare\audit_logs$\audit_last.xml'.&lt;BR /&gt;
05-24-2016 15:51:24.208 -0400 INFO  TailReader - Could not send data to output queue (parsingQueue), retrying...&lt;BR /&gt;
05-24-2016 15:51:36.997 -0400 INFO  TailReader - Could not send data to output queue (parsingQueue), retrying...&lt;BR /&gt;
05-24-2016 15:52:26.751 -0400 INFO  TailReader - Continuing...&lt;BR /&gt;
05-24-2016 15:52:26.751 -0400 INFO  TailReader -   ...continuing.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:49:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264548#M50799</guid>
      <dc:creator>kapanig</dc:creator>
      <dc:date>2020-09-29T09:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264549#M50800</link>
      <description>&lt;P&gt;I am actually having the same issue with Splunk ingesting the logs multiple times.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 21:54:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264549#M50800</guid>
      <dc:creator>nbonner</dc:creator>
      <dc:date>2016-06-07T21:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264550#M50801</link>
      <description>&lt;P&gt;As noted in the comments above, the key is to tell Splunk where to find the timestamp, and that will cause the events to break properly. In props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;TIME_PREFIX = &amp;lt;TimeCreated SystemTime=
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Otherwise, I was able to quickly get XML field extraction working by piping to &lt;CODE&gt;xmlkv&lt;/CODE&gt;. That should be the same end result as &lt;CODE&gt;kv_mode=xml&lt;/CODE&gt;. Here's a screenshot:&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/1180iA2C2A254F2757588/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jun 2017 19:24:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264550#M50801</guid>
      <dc:creator>hrottenberg_spl</dc:creator>
      <dc:date>2017-06-30T19:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264551#M50802</link>
      <description>&lt;P&gt;Yeah, that works partially. Is there a way to extract automatically al data in fields of the type:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;&amp;lt;Data Name="fieldname"&amp;gt;value&amp;lt;/Data&amp;gt;&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Those do not get extracted when piping through xmlkv, only the value for the last "Data" field gets extracted as you can see on your picture.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2017 15:25:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264551#M50802</guid>
      <dc:creator>aosso</dc:creator>
      <dc:date>2017-08-03T15:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264552#M50803</link>
      <description>&lt;P&gt;For time travelers - my guess for the duplicate logs was that xml insertion does not happen at the end of the file throwing off Splunk's check mechanism for detecting change - re-indexing the whole file. I mitig ated this by not monitoring the file currently being written to and having the file rotated every 15 minutes and monitoring the rotated files. These rotated files wont have anything written in them once they are created - hence avoiding the problem. Hope it helps.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 18:04:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264552#M50803</guid>
      <dc:creator>sk314</dc:creator>
      <dc:date>2017-09-01T18:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264553#M50804</link>
      <description>&lt;P&gt;We ended up doing something similar.  Our logs roll after they reach 512MB &amp;amp; we only have Splunk ingest the rolled files.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2017 15:26:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264553#M50804</guid>
      <dc:creator>nbonner</dc:creator>
      <dc:date>2017-09-05T15:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264554#M50805</link>
      <description>&lt;P&gt;How are you getting the files out of NetApp? Are you using a forwarder or is the Filer sending the files to a Heavy Forwarder?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Aug 2018 17:23:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264554#M50805</guid>
      <dc:creator>rmf185039</dc:creator>
      <dc:date>2018-08-15T17:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264555#M50806</link>
      <description>&lt;P&gt;NetApp filers create a log volume that we expose as a CIFS share.  We monitor these shares with a Heavy Forwarder.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Aug 2018 19:44:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264555#M50806</guid>
      <dc:creator>nbonner</dc:creator>
      <dc:date>2018-08-15T19:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264556#M50807</link>
      <description>&lt;P&gt;Has anyone had success with getting the NetApp CIFS logs parsed out correctly? I have tried to manually upload one of these xml files on a standalone sandbox server, and was still not able to get all the fields parsed out correctly. I believe the ONTAP 9 documentation says the logs can be written either in xml or evtx file formats. Would these logs be parsed better if they were written in an evtx file format instead of xml&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 20:09:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264556#M50807</guid>
      <dc:creator>PranaySompalli</dc:creator>
      <dc:date>2018-12-21T20:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264557#M50808</link>
      <description>&lt;P&gt;i ended up using xml and parse them with a custom props and transforms.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 11:36:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/264557#M50808</guid>
      <dc:creator>rmf185039</dc:creator>
      <dc:date>2019-01-02T11:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Splunk to index NetApp CIFS logs in XML format?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/641112#M109360</link>
      <description>&lt;P&gt;Hi, please can you share how exactly were you monitoring the share&amp;nbsp;&lt;BR /&gt;If you can share how it was mounted and then how you configured the UF to see the share/file&lt;BR /&gt;&lt;BR /&gt;Was is just normal add data and monitor a local file ( which was the mount actually) ?&lt;BR /&gt;thanks&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2023 11:37:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-Splunk-to-index-NetApp-CIFS-logs-in-XML-format/m-p/641112#M109360</guid>
      <dc:creator>printul77700</dc:creator>
      <dc:date>2023-04-24T11:37:30Z</dc:date>
    </item>
  </channel>
</rss>

