Hello there,
you should install S.o.S that comes along with a custom command called btool. For example, right from Splunk search bar:
| btool <conf file name>
eg:
| btool inputs
or
| btool props
and so on.. Since you have also field extraction of all this, you can even filter for stanza name, app name and so:
| btool inputs | search stanza="WinEventLog://Security"
or
| btool props | search app="Your_wonderful_parsing_app_name"
The output is pefectly readable:
Hope it helps..
Cheers
... View more