All Apps and Add-ons

NESSUS Scan digest

hartfoml
Motivator

I am doing a monitor file input of a nessas scan data files.
Splunk reads the files in as one event per line.

The report on each system scaned is between the following to tags in the data file

<ReportHost name="xxx.xxx.xxx.xxx">
</ReportHost>

there can be as many as 3 or 4 hundred lines between these tags

I have two questions

1) What is the best way to put the data into splunk so that all the "ReportHost" info is together for searching reporting on each system?
2) how do I get the multi event information already in the splunk index together into one event for each ReportHost so that I can use the existing data to develop reports?

Tags (1)
0 Karma
1 Solution

yannK
Splunk Employee
Splunk Employee

You have to possibilities :

  • define the event parsing at index time : event breaking

http://docs.splunk.com/Documentation/Splunk/4.2.5/Data/Indexmulti-lineevents

in props.conf of the indexer

[mynessussourcetype]
SHOULD_LINEMERGE=true
BREAK_ONLY_BEFORE =<ReportHost name=
MUST_BREAK_AFTER =</ReportHost>

(the < and > may be missing before.)

and define the timestamp extaction
see http://docs.splunk.com/Documentation/Splunk/4.2.5/Data/Tunetimestampextractionforbetterindexingperfo...

  • or if all your events are indexed as single line events, try to use transactions at search time

see http://docs.splunk.com/Documentation/Splunk/4.2.5/SearchReference/Transaction

sourcetype=mynessussourcetype | transaction startswith="<ReportHost name" endswith="</ReportHost>"

and tune using all the other options (maxspan, maxpause ...)

View solution in original post

yannK
Splunk Employee
Splunk Employee

You have to possibilities :

  • define the event parsing at index time : event breaking

http://docs.splunk.com/Documentation/Splunk/4.2.5/Data/Indexmulti-lineevents

in props.conf of the indexer

[mynessussourcetype]
SHOULD_LINEMERGE=true
BREAK_ONLY_BEFORE =<ReportHost name=
MUST_BREAK_AFTER =</ReportHost>

(the < and > may be missing before.)

and define the timestamp extaction
see http://docs.splunk.com/Documentation/Splunk/4.2.5/Data/Tunetimestampextractionforbetterindexingperfo...

  • or if all your events are indexed as single line events, try to use transactions at search time

see http://docs.splunk.com/Documentation/Splunk/4.2.5/SearchReference/Transaction

sourcetype=mynessussourcetype | transaction startswith="<ReportHost name" endswith="</ReportHost>"

and tune using all the other options (maxspan, maxpause ...)

hartfoml
Motivator

Thats it thanks this works

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Observability Simplified: Combining User Experience, Application Performance & ...

Tech Talk Observability Simplified: Combining User Experience, Application Performance & Network ...

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...

Global Splunk User Group Events: May + June 2026

Your Splunk Community Awaits: Discover Upcoming User Group Events Worldwide    Staying ahead in the fast-paced ...