<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to deploy the Palo Alto app in an Indexer Cluster environment in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262976#M30338</link>
    <description>&lt;P&gt;Very glad it's working now.  Thanks for letting us know!&lt;/P&gt;</description>
    <pubDate>Thu, 15 Oct 2015 14:58:38 GMT</pubDate>
    <dc:creator>btorresgil</dc:creator>
    <dc:date>2015-10-15T14:58:38Z</dc:date>
    <item>
      <title>How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262956#M30318</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;

&lt;P&gt;I'm having trouble deploying the &lt;STRONG&gt;Palo Alto Networks app (4.2.2)&lt;/STRONG&gt; in &lt;STRONG&gt;Splunk Enterprise (6.2.2)&lt;/STRONG&gt;. The setup is &lt;STRONG&gt;1x Search Head, 1x Cluster Master, 2x Indexers&lt;/STRONG&gt;, receiving data from a separate &lt;STRONG&gt;Universal Forwarder&lt;/STRONG&gt; that reads off a directory populated by &lt;STRONG&gt;syslog-ng&lt;/STRONG&gt;.&lt;/P&gt;

&lt;P&gt;The Palo Alto app was deployed as a &lt;STRONG&gt;Distributed Configuration Bundle&lt;/STRONG&gt; from the &lt;STRONG&gt;Search Head&lt;/STRONG&gt;, and I saw it to be successfully deployed against the 2x indexers.&lt;/P&gt;

&lt;P&gt;The Universal Forwarder has a input.conf stanza for the PAN data with:&lt;BR /&gt;
&lt;STRONG&gt;index = pan_logs&lt;BR /&gt;
sourcetype = pan_log&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Data is coming into the system, and when searching (from Search Head):&lt;BR /&gt;
&lt;STRONG&gt;index=pan_logs sourcetype=pan_log&lt;/STRONG&gt; (shows every event)&lt;BR /&gt;
&lt;STRONG&gt;index=pan_logs sourcetype=pan_config&lt;/STRONG&gt; (shows no events)&lt;/P&gt;

&lt;P&gt;In fact, I can see only one sourcetype in that index: &lt;STRONG&gt;pan_log&lt;/STRONG&gt;, so it is not getting correctly parsed. I tried loading the syslog-ng data in my local laptop running the PAN app and it worked fine, as in, the sourcetype fields populate correctly. That means the data coming out of syslog-ng is correct.&lt;/P&gt;

&lt;P&gt;I can also see the /slave-apps/ and /master-apps/ directories replicated correctly in the indexers. I haven't modified the transforms.conf or props.conf files, but I can see they are there, and contain the necessary rules to correctly assign the event's source type.&lt;/P&gt;

&lt;P&gt;I think that for some reason, the transforms.conf and props.conf for the PAN app is not getting picked up by the indexers, thus not getting the correct sourcetypes.&lt;/P&gt;

&lt;P&gt;I'm at a loss on how to troubleshoot this further. Any ideas would be greatly appreciated.&lt;/P&gt;

&lt;P&gt;Dan.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:29:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262956#M30318</guid>
      <dc:creator>dmartinez_splun</dc:creator>
      <dc:date>2020-09-29T07:29:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262957#M30319</link>
      <description>&lt;P&gt;Could it be that in a distributed, clustered environment I need to setup &lt;STRONG&gt;SplunkforPaloAltoNetwork/metadata/default.meta&lt;/STRONG&gt; permissions to &lt;STRONG&gt;global&lt;/STRONG&gt; rather than &lt;STRONG&gt;none&lt;/STRONG&gt;?&lt;/P&gt;

&lt;P&gt;I didn't have to do that in the all-in-one deployment, in which they all appear as &lt;STRONG&gt;none&lt;/STRONG&gt; by default.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Default:&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;###PROPS
 [props]
 export = none
 ###TRANSFORMS
 [transforms]
 export = none
 [lookups]
 export = none
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;Proposed Change:&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;###PROPS
 [props]
 export = system
 ###TRANSFORMS
 [transforms]
 export = system
 [lookups]
 export = system
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;As a test in the customer environment, I'm planning to execute the change on the &lt;STRONG&gt;Search Head&lt;/STRONG&gt;, as well as on the &lt;STRONG&gt;Cluster Master&lt;/STRONG&gt;, &lt;STRONG&gt;Restarting&lt;/STRONG&gt; both the Search Head and Cluster Master after having edited the &lt;STRONG&gt;default.meta&lt;/STRONG&gt; file.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Oct 2015 02:25:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262957#M30319</guid>
      <dc:creator>dmartinez_splun</dc:creator>
      <dc:date>2015-10-11T02:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262958#M30320</link>
      <description>&lt;P&gt;David,&lt;/P&gt;

&lt;P&gt;Did this resolve your issue?&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Robert&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 17:12:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262958#M30320</guid>
      <dc:creator>rtoloczk</dc:creator>
      <dc:date>2015-10-13T17:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262959#M30321</link>
      <description>&lt;P&gt;It didn't. Developing another theory now...&lt;/P&gt;

&lt;P&gt;The forwarders are full Splunk instances, as in, Heavy Forwarders.&lt;/P&gt;

&lt;P&gt;I wonder whether the app &lt;STRONG&gt;must&lt;/STRONG&gt; be installed in the forwarder &lt;STRONG&gt;only&lt;/STRONG&gt; in the case of a heavy forwarder. I'm planning to test that next.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 05:12:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262959#M30321</guid>
      <dc:creator>dmartinez_splun</dc:creator>
      <dc:date>2015-10-14T05:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262960#M30322</link>
      <description>&lt;P&gt;The theory now is that given the forwarder is a Heavy Forwarder, the app needs to be installed in the Forwarder as well.&lt;/P&gt;

&lt;P&gt;This link (&lt;A href="http://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings%3F"&gt;http://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings%3F&lt;/A&gt;) explains how both the Input and Parsing stages are performed in the Forwarder - when using a Heavy Forwarder:&lt;/P&gt;

&lt;P&gt;Heavy Forwarder → Indexer&lt;BR /&gt;
Input, Parsing  → Indexing, Search&lt;/P&gt;

&lt;P&gt;And how transforms.conf is looked at during the Parsing phase:&lt;/P&gt;

&lt;P&gt;Parsing&lt;BR /&gt;
 - props.conf&lt;BR /&gt;
 - &lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;BR /&gt;
 - datetime.xml&lt;/P&gt;

&lt;P&gt;and not during the Indexing stage:&lt;/P&gt;

&lt;P&gt;Indexing&lt;BR /&gt;
- props.conf&lt;BR /&gt;
- indexes.conf&lt;BR /&gt;
- segmenters.conf&lt;BR /&gt;
- multikv.conf&lt;/P&gt;

&lt;P&gt;Trying this next... will update.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 07:10:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262960#M30322</guid>
      <dc:creator>dmartinez_splun</dc:creator>
      <dc:date>2015-10-14T07:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262961#M30323</link>
      <description>&lt;P&gt;The PAN app works at Search Time to break out all the different sourcetypes. These are search time transforms. As long as your data is getting indexed properly and pan_logs. &lt;/P&gt;

&lt;P&gt;So it does depend on your ingest framework. If you're ingesting via UDP directly on indexers, you need the inputs and the props/transforms from the App.&lt;/P&gt;

&lt;P&gt;If you're ingesting via syslog on a UF, you dont need the app, just set the sourcetype to pan_log. The indexers will need the APP though.&lt;/P&gt;

&lt;P&gt;If you're ingesting via syslog / UDP on a HF, you need the props/transforms, same as an indexer. &lt;/P&gt;

&lt;P&gt;Then on the SH, you also need the App. The recognition of the pan:traffic|system|threat|log|config sourcetypes are done at search time, not index time.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=pan_logs earliest=-1h@h | stats count by sourcetype
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Assuming you're using the standard configuration, that search should return the different groups of PAN sourcetypes.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 07:21:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262961#M30323</guid>
      <dc:creator>esix_splunk</dc:creator>
      <dc:date>2015-10-14T07:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262962#M30324</link>
      <description>&lt;P&gt;Hi Eric,&lt;/P&gt;

&lt;P&gt;So, just to clarify, when you say: "If you're ingesting via syslog / UDP on a HF, you need the props/transforms, same as an indexer."&lt;/P&gt;

&lt;P&gt;Do you mean that one would need the Palo Alto App in the Search Head, Indexers, as well as the Heavy Forwarder? My previously proposed answer has my thinking on the why.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 07:27:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262962#M30324</guid>
      <dc:creator>dmartinez_splun</dc:creator>
      <dc:date>2015-10-14T07:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262963#M30325</link>
      <description>&lt;P&gt;If you're ingesting on a HF, then you need the app there, and don't need it on the indexers. &lt;/P&gt;

&lt;P&gt;That's not always the case however, but in this case, the HF is cooking the data and forwarding to the indexers with the relevant index time fields and metadata.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 07:30:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262963#M30325</guid>
      <dc:creator>esix_splunk</dc:creator>
      <dc:date>2015-10-14T07:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262964#M30326</link>
      <description>&lt;P&gt;Thank you both. &lt;/P&gt;

&lt;P&gt;However, I am still not getting the correct sourcetypes. &lt;/P&gt;

&lt;P&gt;I have my PAs sending their syslogs to a Syslog-NG server with a UF. The UF's inputs.conf sets the index to pan_logs and the sourcetype to pan_log.  Both the Search Heads and the Indexers have the app installed. &lt;/P&gt;

&lt;P&gt;The standalone (non-clustered) Indexer is reassigning the correct sourcetypes (pan_traffic, pan_config, etc), however the indexers in the cluster are not. I only see the original set pan_log. &lt;/P&gt;

&lt;P&gt;Is there a different required config for a clustered instance? &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:34:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262964#M30326</guid>
      <dc:creator>rtoloczk</dc:creator>
      <dc:date>2020-09-29T07:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262965#M30327</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;The app needs to be installed on all searchheads, indexers, and heavy forwarders.  Since the sourcetype for the events is pan_log, it means the events are not getting parsed by the app.  9 times out of 10 this is because the logs have been subtly modified by Syslog-NG so the props/transforms cannot recognize them.  So...&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt; Make sure the app is installed on all necessary Splunk nodes&lt;/LI&gt;
&lt;LI&gt; Verify syslog-ng isn't adding any characters to the logs or modifying them in any way&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Hope that helps!&lt;/P&gt;

&lt;P&gt;Update: an earlier version of this answer said the sourcetype was pan_logs, but it is pan_log.  This has been corrected.  (thanks mbonsack)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:37:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262965#M30327</guid>
      <dc:creator>btorresgil</dc:creator>
      <dc:date>2020-09-29T07:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262966#M30328</link>
      <description>&lt;P&gt;Is the sourcetype pan_log or pan_logs(plural)?  This is very confusing and could be the source of the problem.  The &lt;EM&gt;index&lt;/EM&gt; is pan_logs, correct?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:34:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262966#M30328</guid>
      <dc:creator>mbonsack_splunk</dc:creator>
      <dc:date>2020-09-29T07:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262967#M30329</link>
      <description>&lt;P&gt;The sourcetype is pan_log&lt;/P&gt;

&lt;P&gt;The index is pan_logs&lt;/P&gt;

&lt;P&gt;I initially typed it wrong in my answer, but corrected it now.  Thanks for the catch.&lt;/P&gt;

&lt;P&gt;Yes, this is confusing, and it will be changed in the next version of the app (version 5.0) coming out soon.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 17:15:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262967#M30329</guid>
      <dc:creator>btorresgil</dc:creator>
      <dc:date>2015-10-14T17:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262968#M30330</link>
      <description>&lt;P&gt;The sourcetype is set to pan_log . The following is the inputs.conf stanza for my syslog-ng server&lt;/P&gt;

&lt;H3&gt;Push PaloAlto Syslog to Splunk:&lt;/H3&gt;

&lt;P&gt;[monitor:///var/log/syslog-ng/paloalto]&lt;BR /&gt;
disabled = false&lt;BR /&gt;
index = pan_logs&lt;BR /&gt;
sourcetype = pan_log&lt;BR /&gt;
no_appending_timestamp=true&lt;BR /&gt;
host_segment = 5&lt;/P&gt;

&lt;P&gt;The architecture is now:&lt;BR /&gt;
 - PA sends syslog to syslog-ng server with UF&lt;BR /&gt;
 - UF forwards to indexer cluster load balancing between three indexers&lt;BR /&gt;
 - Each indexer has the app in the $SPLUNK_HOME/etc/slave-apps/_cluster directory&lt;BR /&gt;
 - The search head has the app in $SPLUNK_HOME/etc/apps&lt;/P&gt;

&lt;P&gt;Our 2nd site with just PA --&amp;gt; UF --&amp;gt; Standalone indexer &amp;lt;-- Search Head parses the logs just fine with the correct sourcetypes. &lt;/P&gt;

&lt;P&gt;Our primary site did have a stand alone indexer and it worked. When we changed to the indexer cluster is when the parsing/sourcetyping stopped working. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:34:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262968#M30330</guid>
      <dc:creator>rtoloczk</dc:creator>
      <dc:date>2020-09-29T07:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262969#M30331</link>
      <description>&lt;P&gt;As a test, I copied the app from .../etc/slave-app/_cluster to /etc/apps on one of the clustered indexers and rebooted the box. &lt;/P&gt;

&lt;P&gt;The sourcetyping is now correct for indexer02, but incorrect on indexer01 and indexer03&lt;/P&gt;

&lt;P&gt;There appears to be something unique with the clustered indexer setup&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 17:54:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262969#M30331</guid>
      <dc:creator>rtoloczk</dc:creator>
      <dc:date>2015-10-14T17:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262970#M30332</link>
      <description>&lt;P&gt;Permissions?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 17:56:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262970#M30332</guid>
      <dc:creator>mbonsack_splunk</dc:creator>
      <dc:date>2015-10-14T17:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262971#M30333</link>
      <description>&lt;P&gt;The app in both /etc/apps and /etc/slave-apps have the same OS level permissions and the same Splunk app permissions as listed below&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Application-level permissions&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[]
access = read : [ * ], write : [ admin, power ]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;EVENT TYPES&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[eventtypes]
export = system
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;PROPS&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[props]
export = system
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;TRANSFORMS&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[transforms]
export = system

[lookups]
export = system
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;OTHER&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[savedsearches]
export = none

[commands]
export = system
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 14 Oct 2015 18:07:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262971#M30333</guid>
      <dc:creator>rtoloczk</dc:creator>
      <dc:date>2015-10-14T18:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262972#M30334</link>
      <description>&lt;P&gt;Installed the app in SH, Cluster Master, and Heavy Forwarders and the thing started working as expected. So copying the app folder into the HF and restarting did the job.&lt;/P&gt;

&lt;P&gt;A little confused though... All data seemed to be parsed into the right sourcetypes now, including last week's data, which hadn't been parsed correctly. I was expecting only today's data to be parsed correctly. (Not that I'm complaining! ha!, but would like to understand why..)&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 06:23:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262972#M30334</guid>
      <dc:creator>dmartinez_splun</dc:creator>
      <dc:date>2015-10-15T06:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262973#M30335</link>
      <description>&lt;P&gt;The App applies field extractions and parsing at Search Time, not index time. This is why historical data is working correctly.&lt;/P&gt;

&lt;P&gt;Where on the CM did you put this?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 07:22:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262973#M30335</guid>
      <dc:creator>esix_splunk</dc:creator>
      <dc:date>2015-10-15T07:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262974#M30336</link>
      <description>&lt;P&gt;Configuration for clustered indexers needs to be applied via the cluster bundles under $splunk_home/etc/master-apps/.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 07:22:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262974#M30336</guid>
      <dc:creator>esix_splunk</dc:creator>
      <dc:date>2015-10-15T07:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to deploy the Palo Alto app in an Indexer Cluster environment</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262975#M30337</link>
      <description>&lt;P&gt;Thanks Eric,&lt;/P&gt;

&lt;P&gt;It's in the /master-apps/ in the CM, but it was pushed there via the UI, using the Distributed Configuration Bundle from the Search Head. It's replicated correctly in the /slave-apps/ directories.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 10:44:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-deploy-the-Palo-Alto-app-in-an-Indexer-Cluster/m-p/262975#M30337</guid>
      <dc:creator>dmartinez_splun</dc:creator>
      <dc:date>2015-10-15T10:44:25Z</dc:date>
    </item>
  </channel>
</rss>

