Getting Data In

How to automatically extract fields from XML data (not using the xmlkv command with the 10000 limit)?

bravon
Communicator

Hi,

I collect "WinEventLog:Microsoft-Windows-AppLocker/EXE and DLL" using renderxml=true.
I can extract fields from this data using the command | xmlkv
However, this command only accepts 10000 rows of data, so my goal is to make Splunk do this in the background, and not only for 10000 events.
I have tried tons of combinations in props.conf from https://answers.splunk.com/answers/2889/automatically-extract-xml-key-value-pairs.html and I still have no luck. In my test environment, this props.conf is present on the search head and indexer.

My props.conf

[xmlWinEventLog:*]
KV_MODE = xml

[WinEventLog:*]
KV_MODE = xml

[source:WinEventLog:Microsoft-Windows-AppLocker/EXE and DLL]
KV_MODE = xml
0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...