<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SC4S - PaloAlto logs not processed correctly in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/SC4S-PaloAlto-logs-not-processed-correctly/m-p/749141#M22547</link>
    <description>&lt;P&gt;Couldn't you just use 1601 or some other port?&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jul 2025 03:13:19 GMT</pubDate>
    <dc:creator>vader13</dc:creator>
    <dc:date>2025-07-03T03:13:19Z</dc:date>
    <item>
      <title>SC4S - PaloAlto logs not processed correctly</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SC4S-PaloAlto-logs-not-processed-correctly/m-p/583224#M11385</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to configure PaloAlto logs via the &lt;SPAN&gt;Splunk Connect for Syslog.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I followed the instructions here&amp;nbsp;&lt;BR /&gt;&lt;A href="https://splunk.github.io/splunk-connect-for-syslog/main/sources/PaloaltoNetworks/" target="_blank" rel="noopener"&gt;https://splunk.github.io/splunk-connect-for-syslog/main/sources/PaloaltoNetworks/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I configured the syslog at PaloAlto according the instructions. I also c&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can see the syslog connections arriving to the host from the firewall using the command tcpdump port 514.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Add the following lines to splunk_metadata.csv&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;pan_config,index,test
pan_correlation,index,test
pan_globalprotect,index,test
pan_hipmatch,index,test
pan_log,index,test
pan_system,index,test
pan_threat,index,test
pan_traffic,index,test
pan_userid,index,test&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And restart sc4s&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;systemctl restart sc4s&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I checked the index test and it is empty. I enabled the debug by adding with the line in the env_file&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;SC4S_DEST_GLOBAL_ALTERNATES=d_hec_debug&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;and it seems like the index defined in the spplunk_metadata.csv is not taken, instead osnix is used.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;curl -k -u "sc4s HEC debug:$SC4S_DEST_SPLUNK_HEC_DEFAULT_TOKEN" "https://splunk.XX.XXX.XXu:8088/services/collector/event" -d '{"time":"1643726324.000","sourcetype":"nix:syslog","source":"program:","index":"osnix","host":"atlas-fw-01.XXX.XX.XX","fields":{"sc4s_vendor_product":"nix_syslog","sc4s_syslog_severity":"info","sc4s_syslog_format":"rfc5424_strict","sc4s_syslog_facility":"user","sc4s_proto":"UDP","sc4s_loghost":"xxxxxxxxxx","sc4s_fromhostip":"192.168.10.100","sc4s_destport":"514","sc4s_container":"xxxxxxxx"},"event":"2022-02-01T14:38:44.000+00:00 atlas-fw-01.xxx.xxx.xxx - - - -  1,2022/02/01 15:38:43,011901021137,TRAFFIC,end,2561,2022/02/01 15:38:43,192.168.20.63,157.240.27.54,154.14.118.254,157.240.27.54,Normal traffic,xxx\\yyy,,quic,vsys1,Internal,External,ae1,ae2.6,Splunk,2022/02/01 15:38:43,113676,1,56081,443,49985,443,0x400019,udp,allow,7358,2250,5108,19,2022/02/01 15:36:43,0,any,,7030011678692056750,0x0,192.168.0.0-192.168.255.255,Germany,,7,12,aged-out,0,0,0,0,,atlas-fw-01,from-policy,,,0,,0,,N/A,0,0,0,0,c8250554-4ccd-46e3-8498-e74cfe9cdd10,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2022-02-01T15:38:44.130+01:00,,,infrastructure,networking,browser-based,1,tunnel-other-application,,quic,no,no,0"}'&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I already check and the HEC token is allowed to index test.&lt;/P&gt;&lt;P&gt;Could someone tell me what is happening?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 15:08:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SC4S-PaloAlto-logs-not-processed-correctly/m-p/583224#M11385</guid>
      <dc:creator>corti77</dc:creator>
      <dc:date>2022-02-01T15:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: SC4S - PaloAlto logs not processed correctly</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SC4S-PaloAlto-logs-not-processed-correctly/m-p/583369#M11397</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I reply myself here for future reference, it might help others.&lt;/P&gt;&lt;P&gt;My issue was finally solved and it was due to the format PaloAlto produces the syslog events. to be compatible with SC4S, we need to configure PaloAlto to send the logs to port 601 in TCP and with the format EITF.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="syslogPaloAlto.PNG" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/17789i35EC1D4A93B6638E/image-size/large?v=v2&amp;amp;px=999" role="button" title="syslogPaloAlto.PNG" alt="syslogPaloAlto.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Then, in the SC4S host , you might need to open the flow in the local firewall , in my case it was firewalld.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;​&lt;/SPAN&gt;&lt;STRONG&gt;firewall-cmd --permanent --add-port 601/tcp&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;firewall-cmd --runtime-to-permanent&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;firewall-cmd --reload&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;finally the lines in the splunk_metadata.csv, in my case to use a different index.&lt;BR /&gt;pan_traffic,index,pan_logs&lt;BR /&gt;pan_config,index,pan_logs&lt;BR /&gt;pan_correlation,index,pan_logs&lt;BR /&gt;pan_globalprotect,index,pan_logs&lt;BR /&gt;pan_hipmatch,index,pan_logs&lt;BR /&gt;pan_log,index,pan_logs&lt;BR /&gt;pan_system,index,pan_logs&lt;BR /&gt;pan_threat,index,pan_logs&lt;BR /&gt;pan_userid,index,pan_logs&lt;BR /&gt;&lt;BR /&gt;and that is all. I hope it helps someone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 11:25:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SC4S-PaloAlto-logs-not-processed-correctly/m-p/583369#M11397</guid>
      <dc:creator>corti77</dc:creator>
      <dc:date>2022-02-02T11:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: SC4S - PaloAlto logs not processed correctly</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/SC4S-PaloAlto-logs-not-processed-correctly/m-p/749141#M22547</link>
      <description>&lt;P&gt;Couldn't you just use 1601 or some other port?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 03:13:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/SC4S-PaloAlto-logs-not-processed-correctly/m-p/749141#M22547</guid>
      <dc:creator>vader13</dc:creator>
      <dc:date>2025-07-03T03:13:19Z</dc:date>
    </item>
  </channel>
</rss>

