Getting Data In

How to automatically extract fields from XML data (not using the xmlkv command with the 10000 limit)?

bravon
Communicator

Hi,

I collect "WinEventLog:Microsoft-Windows-AppLocker/EXE and DLL" using renderxml=true.
I can extract fields from this data using the command | xmlkv
However, this command only accepts 10000 rows of data, so my goal is to make Splunk do this in the background, and not only for 10000 events.
I have tried tons of combinations in props.conf from https://answers.splunk.com/answers/2889/automatically-extract-xml-key-value-pairs.html and I still have no luck. In my test environment, this props.conf is present on the search head and indexer.

My props.conf

[xmlWinEventLog:*]
KV_MODE = xml

[WinEventLog:*]
KV_MODE = xml

[source:WinEventLog:Microsoft-Windows-AppLocker/EXE and DLL]
KV_MODE = xml
0 Karma
Get Updates on the Splunk Community!

Cisco Catalyst Center Meets Splunk ITSI: From 'Payments Are Down' to Root Cause in ...

The Problem: When Networks and Services Don't Talk Payment systems fail at a retail location. Customers are ...

Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore

Are you ready to uncover the threats hiding in plain sight? Join us for "Print, Leak, Repeat: UEBA Insider ...

New Year, New Changes for Splunk Certifications

As we embrace a new year, we’re making a small but important update to the Splunk Certification ...