<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk for Palo Alto - Config - Different Index name than default in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Palo-Alto-Config-Different-Index-name-than-default/m-p/239311#M73653</link>
    <description>&lt;P&gt;If this has answered your question, please consider marking this question as answered.  Thank You.&lt;/P&gt;</description>
    <pubDate>Wed, 14 Oct 2015 21:41:52 GMT</pubDate>
    <dc:creator>scruse</dc:creator>
    <dc:date>2015-10-14T21:41:52Z</dc:date>
    <item>
      <title>Splunk for Palo Alto - Config - Different Index name than default</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Palo-Alto-Config-Different-Index-name-than-default/m-p/239309#M73651</link>
      <description>&lt;P&gt;I've installed the Splunk for Palo Alto app and while attempting to configure it found this reference.&lt;BR /&gt;
&lt;EM&gt;"In the inputs.conf file, add the following configuration. For UDP syslogs, make sure to include the line no_appending_timestamp = true.&lt;BR /&gt;
[udp://5514]&lt;BR /&gt;
index = pan_logs&lt;BR /&gt;
sourcetype = pan_log&lt;BR /&gt;
connection_host = ip&lt;BR /&gt;
no_appending_timestamp = true"&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;The issue is my Palo logs are already in Splunk with the following (multiple source types).&lt;BR /&gt;
Index=paloalto&lt;BR /&gt;
sourcetype=pan_traffic&lt;BR /&gt;
sourcetype=pan_threat&lt;BR /&gt;
sourcetype=pan_system&lt;BR /&gt;
sourcetype=pan_config&lt;/P&gt;

&lt;P&gt;How do I change the app to meet my current configuration. I guess I'm a bit lost on what exactly to do. I've tried to modify the XML but it doesn't seem to work.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
M&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:22:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Palo-Alto-Config-Different-Index-name-than-default/m-p/239309#M73651</guid>
      <dc:creator>mflippin</dc:creator>
      <dc:date>2020-09-29T07:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Palo Alto - Config - Different Index name than default</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Palo-Alto-Config-Different-Index-name-than-default/m-p/239310#M73652</link>
      <description>&lt;P&gt;Within the apps inputs.conf, you can specify the changes to the index and sourcetype to match your current environment needs.&lt;/P&gt;

&lt;P&gt;using the network input you provided as an example&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[udp://5514]
index = pan_logs
sourcetype = pan_log
connection_host = ip
no_appending_timestamp = true
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;you could do&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[udp://5514]
index = paloalto
sourcetype = pan_&amp;lt;whichever sourcetype you want to put it in&amp;gt;
connection_host = ip
no_appending_timestamp = true
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 25 Sep 2015 22:39:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Palo-Alto-Config-Different-Index-name-than-default/m-p/239310#M73652</guid>
      <dc:creator>scruse</dc:creator>
      <dc:date>2015-09-25T22:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Palo Alto - Config - Different Index name than default</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Palo-Alto-Config-Different-Index-name-than-default/m-p/239311#M73653</link>
      <description>&lt;P&gt;If this has answered your question, please consider marking this question as answered.  Thank You.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 21:41:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Palo-Alto-Config-Different-Index-name-than-default/m-p/239311#M73653</guid>
      <dc:creator>scruse</dc:creator>
      <dc:date>2015-10-14T21:41:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Palo Alto - Config - Different Index name than default</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Palo-Alto-Config-Different-Index-name-than-default/m-p/239312#M73654</link>
      <description>&lt;P&gt;Unfortunately the answer from scruse won't work completely because the macros and datamodel in the app all refer to the pan_logs index.  You can use scruse's answer for the index if you also do a find/replace of all references to the pan_logs index in the app.  Many customers do this when they want to rename the index from pan_logs to something else.&lt;/P&gt;

&lt;P&gt;Another option is to rename the index to pan_logs.  Renaming an index in Splunk is non-trivial and I believe it requires actually creating a new index called pan_logs and moving the data over to it.  Google or Splunk support can provide more guidance.&lt;/P&gt;

&lt;P&gt;Regarding the sourcetype, you don't need to modify anything there.  The sourcetype from the inputs.conf (pan_logs) is just a placeholder sourcetype.  Splunk actually parses the logs of this sourcetype in order to move the log to the correct final sourcetype (pan_traffic, pan_threat, pan_config, pan_system).  So just use pan_log as the sourcetype in inputs.conf, and it will automatically take care of parsing and moving the events to the other sourcetypes.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:37:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Palo-Alto-Config-Different-Index-name-than-default/m-p/239312#M73654</guid>
      <dc:creator>btorresgil</dc:creator>
      <dc:date>2020-09-29T07:37:22Z</dc:date>
    </item>
  </channel>
</rss>

