All Apps and Add-ons

Base64: Parsing an XML file using kv_mode=xml, how to get the Base64 script "recurse" and decode more than the first line?

lchumley
New Member

I'm parsing an XML file using the kv_mode=xml in my props.conf and that's all good and well.

However, these XMLs that are coming back as a payload from another app are formatted like this:

<host>PC11</host>
<Registry>
<Value>AbBccDlllK[...]</Value>
<Value>AbBccDQQqq[...]</Value>

In the Search app, the tables format correctly and I get multiple values per host. These values are on separate lines, but not being treated as separate events. I'm fine with that part.

The Values are in Base64. I downloaded the base64 app and ran a decode string against the source type and it worked, but only for the first value of every host. Any ideas on how to make the base64 script "recurse" and decode more than the first line?

0 Karma

jhedgpeth
Path Finder

something to try. split mv field, decode, recombine.

... | mvexpand yourbase64 | base64 field=yourbase64 action=“decode"  | mvcombine yourbase64
0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...