<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I make Splunk for Fortigate find data in a specific index where i have my fortigate data? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30461#M1116</link>
    <description>&lt;P&gt;In my recent experience I wanted to do exactly what you described. This is a summary of what I did...&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;create index fortios5&lt;/LI&gt;
&lt;LI&gt;update data inputs udp and set the destination index for this source to fortios5&lt;/LI&gt;
&lt;LI&gt;copy default/macros.summary to local folder and rename to macros.conf&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;update local/macros.conf section Base Macros definition = index=fortios5 ...&lt;BR /&gt;
Based on some info I found here:&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/25843/palo-alto-app-configuration-procedure.html"&gt;http://answers.splunk.com/answers/25843/palo-alto-app-configuration-procedure.html&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Also because some dashboards were timing out I needed to update etc/system/local/web.conf to include this setting:&lt;BR /&gt;
 [settings]&lt;BR /&gt;
 splunkdConnectionTimeout = 120&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Restart Splunk&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Enjoy&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
    <pubDate>Wed, 24 Dec 2014 18:44:04 GMT</pubDate>
    <dc:creator>itdepartment</dc:creator>
    <dc:date>2014-12-24T18:44:04Z</dc:date>
    <item>
      <title>How do I make Splunk for Fortigate find data in a specific index where i have my fortigate data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30458#M1113</link>
      <description>&lt;P&gt;I can't get splunk for fortigate to use the index where my fortigate data are placed.&lt;BR /&gt;
When i put index=fortigate before every search the results are comming up perfectly.&lt;/P&gt;

&lt;P&gt;my input look like this:&lt;BR /&gt;
[udp://5140]&lt;BR /&gt;
index = fortigate&lt;BR /&gt;
sourcetype = fortigate&lt;BR /&gt;
no_ appending_timestamp = true&lt;/P&gt;

&lt;P&gt;just to clarify that my data are in index fortigate&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2013 11:30:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30458#M1113</guid>
      <dc:creator>bria0029</dc:creator>
      <dc:date>2013-02-13T11:30:46Z</dc:date>
    </item>
    <item>
      <title>Re: How do I make Splunk for Fortigate find data in a specific index where i have my fortigate data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30459#M1114</link>
      <description>&lt;P&gt;go to manager &amp;gt; access control &amp;gt; roles and make the index "fortigate"  searchable and searched by default for the users of the fortigate app.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2013 16:55:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30459#M1114</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2013-02-13T16:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: How do I make Splunk for Fortigate find data in a specific index where i have my fortigate data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30460#M1115</link>
      <description>&lt;P&gt;Yes, but why is it not nessesery to do this if you are working with splunk for ad or exchange? Also with different indexes and not granted rights in roles.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2013 17:20:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30460#M1115</guid>
      <dc:creator>bria0029</dc:creator>
      <dc:date>2013-02-13T17:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: How do I make Splunk for Fortigate find data in a specific index where i have my fortigate data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30461#M1116</link>
      <description>&lt;P&gt;In my recent experience I wanted to do exactly what you described. This is a summary of what I did...&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;create index fortios5&lt;/LI&gt;
&lt;LI&gt;update data inputs udp and set the destination index for this source to fortios5&lt;/LI&gt;
&lt;LI&gt;copy default/macros.summary to local folder and rename to macros.conf&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;update local/macros.conf section Base Macros definition = index=fortios5 ...&lt;BR /&gt;
Based on some info I found here:&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/25843/palo-alto-app-configuration-procedure.html"&gt;http://answers.splunk.com/answers/25843/palo-alto-app-configuration-procedure.html&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Also because some dashboards were timing out I needed to update etc/system/local/web.conf to include this setting:&lt;BR /&gt;
 [settings]&lt;BR /&gt;
 splunkdConnectionTimeout = 120&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Restart Splunk&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Enjoy&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 24 Dec 2014 18:44:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30461#M1116</guid>
      <dc:creator>itdepartment</dc:creator>
      <dc:date>2014-12-24T18:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: How do I make Splunk for Fortigate find data in a specific index where i have my fortigate data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30462#M1117</link>
      <description>&lt;P&gt;You can also check in the App, the eventtypes.conf. You can add the specific index to each eventtype's search. That should quickly fix the issue. Make sure your sourcetype names match what the app is looking for also.  Make sure any changes you make, that you put in the local/eventtypes.conf, and dont change the default. (This will keep the changes when you upgrade..)&lt;/P&gt;

&lt;P&gt;On a side note, making sure the index is globally searchable is the recommended..&lt;/P&gt;</description>
      <pubDate>Thu, 25 Dec 2014 03:32:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-make-Splunk-for-Fortigate-find-data-in-a-specific-index/m-p/30462#M1117</guid>
      <dc:creator>esix_splunk</dc:creator>
      <dc:date>2014-12-25T03:32:12Z</dc:date>
    </item>
  </channel>
</rss>

