Dashboards & Visualizations

How to convert a single XML event into multiple events?

lchandrakanth
New Member

Hi,

I have an XML file with multiple tags, I want to split it into multiple events. What are the configuration need to add in props.conf file

Here is the example,


INFO 2015-01-08 10:16:49  
<V_XML Version="2.0" Direction="Response">  
    <Enquiry >
    <Result />    
    <3DSID>...</3DSIDID>   
    <CHAID>...</CHAID>   
    <CHADD>...</CHADD>    
    <EC>...</EC>
    </Enquiry>
</V_XML>
-------------------
INFO 2015-01-08 10:16:50 
<V_XML Version="2.0" >
     <Transaction >
        <CHAID>...</CHAID>
        <CHADD>...</CHADD>
        <Amt>...</Amt>
        <Currency>...</Currency>
        <EC>...</EC>
        <ExpiryD>......</ExpiryD>
        <MerchantRef>...</MerchantRef>
        <CSCode>...</CSCode>
        <PAN>...</PAN>
      </Transaction>
    </V_XML>
Tags (3)
0 Karma
1 Solution

somesoni2
Revered Legend

Try something like this for your props.conf (on Indexer/Heavy Forwarder)

[YourSourceType]
SHOULD_LINEMERGE=false
LINE_BREAKER=([\r\n]+)\w+\s+\d{4}-\d{2}-\d{2}\s+\d{2}:\d{2:}\d{2}
TIME_FORMAT=%Y-%m-%d %H:%M:%S
TIME_PREFIX=^\w+\s+
MAX_TIMESTAMP_LOOKAHEAD=20

View solution in original post

somesoni2
Revered Legend

Try something like this for your props.conf (on Indexer/Heavy Forwarder)

[YourSourceType]
SHOULD_LINEMERGE=false
LINE_BREAKER=([\r\n]+)\w+\s+\d{4}-\d{2}-\d{2}\s+\d{2}:\d{2:}\d{2}
TIME_FORMAT=%Y-%m-%d %H:%M:%S
TIME_PREFIX=^\w+\s+
MAX_TIMESTAMP_LOOKAHEAD=20

lchandrakanth
New Member

Hi,

Thanks for the info and could you explain the LINE_BREAKER regx format? it will be very helpful for my reference.

0 Karma

andrewb_splunk
Splunk Employee
Splunk Employee

Splunk documentation has good information on LINE_BREAKER. The topic http://docs.splunk.com/Documentation/Splunk/6.3.0/Data/Configureeventlinebreaking is a good starting point.

lchandrakanth
New Member

Thanks soni... I am understand it, the line break based on time stamp.

0 Karma

somesoni2
Revered Legend

Basically on "INFO Timestamp" pattern.

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...