How to get Splunk to process these log file so key-value pairs are created per transaction.
In my case, each transaction is producing a log file - one XML file. So there are a lot of XML files needed to be processed by Splunk.
There are two things you want to do in your props.conf file in order to parts XML files.
First... you need to tell Splunk where to break your event. Depending on what else is in the file you might want to use something like: