Getting Data In

Dumping XML logs

20065945
Explorer

I want to dump the following XML log file keeping in mind the fact that it should give all the tags as a fields such that I could search the events where

Text="Application: Directory started" Category="BIG" Module="WorkflowHost"

What should I write in props.conf


b476f836-36dd-4c30-9a8e-0587c5d34b8d
2014-01-09 10:45:31.69
Application: Directory started
BIG
Workflow
Event
General
WorkflowHost


0
5420
e2ac3262e9b9d03f



b476f836-36dd-4c30-9a8e-0587c5d34b8d
2014-01-09 10:45:41.57
Application: PatientDirectory started
BIG
PatientDirectory
Event
General
PatientDirectory


0
2180
e2ac3262e9b9d03f



b476f836-36dd-4c30-9a8e-0587c5d34b8d
2014-01-09 10:45:42.15
Application: Report started
BIG
Workflow
Event
General
WorkflowHost


0
5420
e2ac3262e9b9d03f


PLs help....:)

Tags (1)
0 Karma
1 Solution

somesoni2
Revered Legend

This works fine for me with your sample data.

On Indexer,

props.conf

[thexml]
BREAK_ONLY_BEFORE = ^\<message\>
MAX_TIMESTAMP_LOOKAHEAD = 150
NO_BINARY_CHECK = 1
pulldown_type = 1
REPORT-xmlext = xmlkv-alternative

transforms.conf

[xmlkv-alternative]
REGEX = <([^\s\>]*)[^\>]*\>([^<]*)\<\/\1\>
FORMAT = $1::$2

View solution in original post

somesoni2
Revered Legend

This works fine for me with your sample data.

On Indexer,

props.conf

[thexml]
BREAK_ONLY_BEFORE = ^\<message\>
MAX_TIMESTAMP_LOOKAHEAD = 150
NO_BINARY_CHECK = 1
pulldown_type = 1
REPORT-xmlext = xmlkv-alternative

transforms.conf

[xmlkv-alternative]
REGEX = <([^\s\>]*)[^\>]*\>([^<]*)\<\/\1\>
FORMAT = $1::$2

20065945
Explorer

Thanks strive but I went through all these links. There is no solution over there. All the conversations are stuck at one point. Hence failure. 🙂

0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...