<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Parsing simple XML fields in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318727#M20523</link>
    <description>&lt;P&gt;Glad it worked. Please go ahead and Accept this Answer so that it gets marked as answered!&lt;/P&gt;</description>
    <pubDate>Thu, 13 Apr 2017 13:29:17 GMT</pubDate>
    <dc:creator>niketn</dc:creator>
    <dc:date>2017-04-13T13:29:17Z</dc:date>
    <item>
      <title>Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318710#M20506</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I need to parse the fields of the XML below:&lt;/P&gt;

&lt;P&gt;1001&lt;BR /&gt;
vulnerability name 001&lt;BR /&gt;
2&lt;BR /&gt;
Audit &lt;BR /&gt;
0&lt;BR /&gt;
successfully completed&lt;BR /&gt;
0&lt;BR /&gt;
USER1, USER2&lt;BR /&gt;
xxxxxxxxxxxxxx xxxxxxxxxxxxxx xxxxxxxxxx&lt;/P&gt;

&lt;P&gt;The data above comes to Splunk via a TCP Input, one XML like the above per each event (record).&lt;BR /&gt;
The fields (and content) I need are obviously the VLN_s.&lt;/P&gt;

&lt;P&gt;Index-time is preferred, but search-time is also OK,&lt;/P&gt;

&lt;P&gt;Can someone help ?&lt;/P&gt;

&lt;P&gt;at your disposal for further details,&lt;/P&gt;

&lt;P&gt;regards&lt;BR /&gt;
Altin&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 11:49:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318710#M20506</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-11T11:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318711#M20507</link>
      <description>&lt;P&gt;@altink... You might have to repost the XML with 101010 button to mark the same as code so that it does not get escaped.&lt;/P&gt;

&lt;P&gt;In Splunk you can use spath or xpath to parse XML data. Is the entire raw data(event) itself XML? Or do you get part of your data as XML?&lt;/P&gt;

&lt;P&gt;If your entire data is XML, you can enable the &lt;CODE&gt;KV_MODE=xml&lt;/CODE&gt; while defining sourcetype in your props.conf so that Splunk extracts the field automatically for you. (&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.5.3/Admin/Propsconf"&gt;http://docs.splunk.com/Documentation/Splunk/6.5.3/Admin/Propsconf&lt;/A&gt;)&lt;/P&gt;

&lt;P&gt;If not you can refer to &lt;CODE&gt;spath&lt;/CODE&gt; command and use &lt;CODE&gt;rex&lt;/CODE&gt; to first extract only XML data and then parse. Refer to documentation &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.5.3/SearchReference/Spath"&gt;http://docs.splunk.com/Documentation/Splunk/6.5.3/SearchReference/Spath&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 12:43:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318711#M20507</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-04-11T12:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318712#M20508</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;&amp;lt;CONTROL&amp;gt; 
&amp;lt;VLN_ID&amp;gt;1001&amp;lt;/VLN_ID&amp;gt;
&amp;lt;VLN_NAME&amp;gt;vulnerability name 001&amp;lt;/VLN_NAME&amp;gt;
&amp;lt;VLN_SEVERITY&amp;gt;2&amp;lt;/VLN_SEVERITY&amp;gt;
&amp;lt;VLN_CATEGORY&amp;gt;Audit&amp;lt;/VLN_CATEGORY&amp;gt; 
&amp;lt;VLN_SCAN_CODE&amp;gt;0&amp;lt;/VLN_SCAN_CODE&amp;gt;
&amp;lt;VLN_SCAN_MESSAGE&amp;gt;successfully completed&amp;lt;/VLN_SCAN_MESSAGE&amp;gt;
&amp;lt;VLN_CTRL_FIND&amp;gt;0&amp;lt;/VLN_CTRL_FIND&amp;gt;
&amp;lt;VLN_CTRL_SUMMARY&amp;gt;ALDO1, ALTIN1&amp;lt;/VLN_CTRL_SUMMARY&amp;gt;
&amp;lt;VLN_CTRL_OUTPUT&amp;gt;xxxxxxxxxxxxxx xxxxxxxxxxxxxx xxxxxxxxxx&amp;lt;/VLN_CTRL_OUTPUT&amp;gt;
&amp;lt;/CONTROL&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 11 Apr 2017 17:45:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318712#M20508</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-11T17:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318713#M20509</link>
      <description>&lt;P&gt;Sorry that didn't reply, not yet used to with the forum.&lt;BR /&gt;
Yes the event is all XML.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 19:03:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318713#M20509</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-11T19:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318714#M20510</link>
      <description>&lt;P&gt;I tried:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="index_test_01"
| spath output=VLN_ID path=CONTROL.VLN_ID 
| spath output=VLN_NAME path=CONTROL.VLN_NAME 
| spath output=VLN_SEVERITY path=CONTROL.VLN_SEVERITY 
| spath output=VLN_CATEGORY path=CONTROL.VLN_CATEGORY 
| spath output=VLN_SCAN_CODE path=CONTROL.VLN_SCAN_CODE 
| spath output=VLN_SCAN_MESSAGE path=CONTROL.VLN_SCAN_MESSAGE 
| spath output=VLN_CTRL_FIND path=CONTROL.VLN_CTRL_FIND 
| spath output=VLN_CTRL_SUMMARY path=CONTROL.VLN_CTRL_SUMMARY
| spath output=VLN_CTRL_OUTPUT path=CONTROL.VLN_CTRL_OUTPUT

| table VLN_ID VLN_NAME VLN_SEVERITY VLN_CATEGORY VLN_SCAN_CODE VLN_SCAN_MESSAGE VLN_CTRL_FIND VLN_CTRL_SUMMARY VLN_CTRL_OUTPUT
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and got the fields as I needed. However it looks un-handy to do this every time in every search. &lt;BR /&gt;
And I don't know how practical will be (and how) to put search conditions on this fields, or refer it&lt;BR /&gt;
as a whole to build dashboard panels and reports&lt;/P&gt;

&lt;P&gt;It look the best would be to extract the fields at index-time,&lt;/P&gt;

&lt;P&gt;However Splunk Doc says:&lt;BR /&gt;
NOTE: &lt;BR /&gt;
We do not recommend adding to the set of fields that are extracted&lt;BR /&gt;
at index time unless it is absolutely necessary because there are&lt;BR /&gt;
negative performance implications.&lt;/P&gt;

&lt;P&gt;So it looks it could be in apps props.conf, but cannot find how&lt;/P&gt;

&lt;P&gt;can you help ?&lt;/P&gt;

&lt;P&gt;regards&lt;BR /&gt;
Altin&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 20:02:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318714#M20510</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-11T20:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318715#M20511</link>
      <description>&lt;P&gt;@Altin, I had requested for &lt;CODE&gt;KV_MODE=xml&lt;/CODE&gt;. This will not perform index time field extraction rather search time field extraction based on sourcetype. You need to define this for your &lt;STRONG&gt;sourcetype&lt;/STRONG&gt;. (PS: As best practice you should include sourcetype in your base search as well).&lt;/P&gt;

&lt;P&gt;Search for the following in the documentation &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Admin/Propsconf"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Admin/Propsconf&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;KV_MODE = [none|auto|auto_escaped|multi|json|xml]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;By default KV_MODE is auto which extracts key value pairs separate by = sign.&lt;/P&gt;

&lt;P&gt;Splunk admin should be able to easily perform above change to KV_MODE as XML.&lt;/P&gt;

&lt;P&gt;Another option for you in case you don't want to rewrite above spath query every time, would be to save the same as a &lt;STRONG&gt;Macro&lt;/STRONG&gt; from &lt;CODE&gt;Settings &amp;gt; Advanced search &amp;gt; Search Macro&lt;/CODE&gt;. That way you can call the same as a function any where in your search/report/dashboard/alert.&lt;/P&gt;

&lt;P&gt;Let me convert this to answer so that you can test and accept the same once it has helped you resolve your issue.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 02:18:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318715#M20511</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-04-12T02:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318716#M20512</link>
      <description>&lt;P&gt;Thank you very much for the advise.&lt;/P&gt;

&lt;P&gt;Initially I tried with Macros. Created a new one and tried to call it in search,&lt;BR /&gt;
as it is advised on:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/6.5.1612/Knowledge/Usesearchmacros"&gt;https://docs.splunk.com/Documentation/SplunkCloud/6.5.1612/Knowledge/Usesearchmacros&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;but it seems the info there is not enough, I tried the first example given&lt;BR /&gt;
Quoted&lt;BR /&gt;
" If you have a search macro named mymacro it looks like this when referenced in a search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; sourcetype=access_* | `mymacro`"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;at no result.&lt;BR /&gt;
error is:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Error in 'SearchParser': Missing a search command before '''. Error at position '29' of search query 'search sourcetype=access_* | 'MY_MACRO''. 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Am I missing something here ? Bu sure I am, but please tell me what? I have all my search inside the macro - what am I supposed to add before ?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 12:12:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318716#M20512</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-12T12:12:51Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318717#M20513</link>
      <description>&lt;P&gt;I tried the kv_mode=xml and got the fields searching:&lt;/P&gt;

&lt;P&gt;index=xxxxx&lt;/P&gt;

&lt;P&gt;The above inside the app in which the source-type resides.&lt;/P&gt;

&lt;P&gt;I got the (kv_mode) XML fields named as in the following:&lt;BR /&gt;
CONTROL.VLN_ID&lt;BR /&gt;
CONTROL.VLN_CATEGORY&lt;BR /&gt;
..............................................&lt;/P&gt;

&lt;P&gt;Is there any way to remove the "CONTROL." part ?&lt;/P&gt;

&lt;P&gt;regards,&lt;BR /&gt;
Altin&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:39:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318717#M20513</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2020-09-29T13:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318718#M20514</link>
      <description>&lt;P&gt;Used rename...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="my_index" sourcetype=my_Source | rename 
CONTROL.VLN_ID AS VLN_ID, 
CONTROL.VLN_NAME AS VLN_NAME
CONTROL.VLN_SEVERITY AS VLN_SEVERITY
CONTROL.VLN_CATEGORY AS VLN_CATEGORY
CONTROL.VLN_SCAN_CODE AS VLN_SCAN_CODE
CONTROL.VLN_SCAN_MESSAGE AS VLN_SCAN_MESSAGE
CONTROL.VLN_CTRL_FIND AS VLN_CTRL_FIND
CONTROL.VLN_CTRL_SUMMARY AS VLN_CTRL_SUMMARY
CONTROL.VLN_CTRL_OUTPUT AS VLN_CTRL_OUTPUT
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;to rename the fields.&lt;BR /&gt;
Since the code is long, I still need to use a Macro to have something as a View (rdbms-sorry!).&lt;BR /&gt;
I created the macro, tested again the search string, gave permission to app (inside which I do the search). &lt;BR /&gt;
when I call it in a search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index="my_index" | `my_MACRO`
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I receive error:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Search Factory: Unknown search command 'index'. 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;can you please advise?&lt;/P&gt;

&lt;P&gt;regards&lt;BR /&gt;
Altin&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 19:29:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318718#M20514</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-12T19:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318719#M20515</link>
      <description>&lt;P&gt;I do use back tick character ( ` ) around macro name&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 19:30:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318719#M20515</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-12T19:30:27Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318720#M20516</link>
      <description>&lt;P&gt;done with simply  'my_MACRO' .&lt;BR /&gt;
I tried this before, I must have missed something&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 19:55:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318720#M20516</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-12T19:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318721#M20517</link>
      <description>&lt;P&gt;... but I cannot search in macro with field conditions, like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`MY_MACRO` VLN_ID=1001
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Error in 'rename' command: Usage: rename [old_name AS/TO/-&amp;gt; new_name]+ &lt;/P&gt;

&lt;P&gt;I do get the full result (field VLN_ID included) when simply searching:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`MY_MACRO`
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;How can I have some search that I can permanently save and then work (filter, stats...) on its columns ?&lt;/P&gt;

&lt;P&gt;regards&lt;BR /&gt;
Altin&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:39:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318721#M20517</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2020-09-29T13:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318722#M20518</link>
      <description>&lt;P&gt;Since you have not posted the macro... I think you are trying to have macro perform all the field renames for you. If it is like that, I would expect the query to be like the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`MY_MACRO`
| where VLN_ID=1001
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;However, the auto-extracted XML field names are fully qualified based on the XML DOM, so you should not rename the field unless you are trying to alias the field for correlating with some other data source. Even though field names are long, you can put them to macros/calculated fields so that your actual query is smaller and easily reusable.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 04:10:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318722#M20518</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-04-13T04:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318723#M20519</link>
      <description>&lt;P&gt;If this helps, kindly Accept the answer and up-vote any comments that may have helped you find your solution.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 04:12:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318723#M20519</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-04-13T04:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318724#M20520</link>
      <description>&lt;P&gt;Thank you very much,&lt;BR /&gt;
that worked&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 12:54:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318724#M20520</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-13T12:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318725#M20521</link>
      <description>&lt;P&gt;... and it did work with a multiple conditions:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`my_MACRO` | where VLN_ID=1001 and VLN_SEVERITY=2 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;but only as long as I search number fields only. &lt;/P&gt;

&lt;P&gt;If I search a string fields (or at least non-number) - I see no results, although&lt;BR /&gt;
 the condition I am setting does exist. like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`my_MACRO` | where VLN_ID=1001 and VLN_SEVERITY=2 and VLN_CATEGORY=Audit

or (Audit quoted)

`my_MACRO` | where VLN_ID=1001 and VLN_SEVERITY=2 and VLN_CATEGORY='Audit'
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What is the problem on the non-number fields ?&lt;/P&gt;

&lt;P&gt;all my raw events have an VLN_CATEGORY='Audit'&lt;/P&gt;

&lt;P&gt;thank you&lt;BR /&gt;
Altin&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 13:05:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318725#M20521</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-13T13:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318726#M20522</link>
      <description>&lt;P&gt;the macro is this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="my_index" sourcetype=my_SourceType | 
rename CONTROL.VLN_ID AS VLN_ID 
CONTROL.VLN_NAME AS VLN_NAME 
CONTROL.VLN_SEVERITY AS VLN_SEVERITY 
CONTROL.VLN_CATEGORY AS VLN_CATEGORY 
CONTROL.VLN_SCAN_CODE AS VLN_SCAN_CODE CONTROL.VLN_SCAN_MESSAGE AS VLN_SCAN_MESSAGE CONTROL.VLN_CTRL_FIND AS VLN_CTRL_FIND CONTROL.VLN_CTRL_SUMMARY AS VLN_CTRL_SUMMARY CONTROL.VLN_CTRL_OUTPUT AS VLN_CTRL_OUTPUT 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 13 Apr 2017 13:13:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318726#M20522</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-13T13:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318727#M20523</link>
      <description>&lt;P&gt;Glad it worked. Please go ahead and Accept this Answer so that it gets marked as answered!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 13:29:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318727#M20523</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-04-13T13:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Parsing simple XML fields</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318728#M20524</link>
      <description>&lt;P&gt;got it - string quotation needed.&lt;/P&gt;

&lt;P&gt;thank you for the pure SQL,&lt;BR /&gt;
:-)&lt;/P&gt;

&lt;P&gt;regards&lt;BR /&gt;
Altin&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 13:36:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Parsing-simple-XML-fields/m-p/318728#M20524</guid>
      <dc:creator>altink</dc:creator>
      <dc:date>2017-04-13T13:36:40Z</dc:date>
    </item>
  </channel>
</rss>

