Hi,
I collect "WinEventLog:Microsoft-Windows-AppLocker/EXE and DLL" using renderxml=true
.
I can extract fields from this data using the command | xmlkv
However, this command only accepts 10000 rows of data, so my goal is to make Splunk do this in the background, and not only for 10000 events.
I have tried tons of combinations in props.conf from https://answers.splunk.com/answers/2889/automatically-extract-xml-key-value-pairs.html and I still have no luck. In my test environment, this props.conf is present on the search head and indexer.
My props.conf
[xmlWinEventLog:*]
KV_MODE = xml
[WinEventLog:*]
KV_MODE = xml
[source:WinEventLog:Microsoft-Windows-AppLocker/EXE and DLL]
KV_MODE = xml