Dashboards & Visualizations

How do I configure Splunk to parse XML log files for each transaction in POS?

jensonthottian
Contributor

I have XML Log files for each transaction in POS

How to get Splunk to process these log file so key-value pairs are created per transaction.
In my case, each transaction is producing a log file - one XML file. So there are a lot of XML files needed to be processed by Splunk.

Is there an approach in Splunk to do it easily?

rsennett_splunk
Splunk Employee
Splunk Employee

There are two things you want to do in your props.conf file in order to parts XML files.
First... you need to tell Splunk where to break your event. Depending on what else is in the file you might want to use something like:

BREAK_ONLY_BEFORE=[you put your regex here]

Or LINE_BREAKER.
Both of these are detailed in the spec for props.conf http://docs.splunk.com/Documentation/Splunk/6.2.2/Admin/Propsconf
Then you'll want to add the directive:
KV_MODE=XML
Which will produce search time field extractions based on your KV pairs.

If the data is already in Splunk and/or you don't have access to the props.conf file you can use spath to do field-time extractions within your search:

http://docs.splunk.com/Documentation/Splunk/6.2.2/SearchReference/Spath

If you want more specifics, you'll have to show some sample data.

Edit your question, and past sample data within the original question.

With Splunk... the answer is always "YES!". It just might require more regex than you're prepared for!
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...