<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto and Heavy Forwarder in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433022#M75710</link>
    <description>&lt;P&gt;What should the inputs.conf file look like on the HF? There isn't an example in the setup guide. This is how I have mine set using index=main for testing. It seems to be working.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[monitor:///var/log/syslog/pan/]
index = main
sourcetype = pan:log
no_appending_timestamp = true
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Sun, 17 Mar 2019 07:07:20 GMT</pubDate>
    <dc:creator>mikesangray</dc:creator>
    <dc:date>2019-03-17T07:07:20Z</dc:date>
    <item>
      <title>Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433008#M75696</link>
      <description>&lt;P&gt;I have a small indexer cluster, single search head, and syslog-ng (all individual systems).&lt;/P&gt;

&lt;P&gt;I'm working through the requirements for the palo alto networks app and add-on. The guide says to use a heavy forwarder, but doens't say why...why use a heavy forwarder? Also, if the syslog-ng box has a heavy forwarder installed and is indexing as well as forwarding, how much data can I expect to be indexed locally? All of it? Configurable, for example, one day's worth of data?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 01:53:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433008#M75696</guid>
      <dc:creator>mikesangray</dc:creator>
      <dc:date>2019-03-15T01:53:03Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433009#M75697</link>
      <description>&lt;P&gt;Hi @mikesangray &lt;/P&gt;

&lt;P&gt;It's generally good idea to only use Heavy Forwarders when they are running scripts/logic for retrieving data from remote APIs etc (like the AWS/Service Now/Office 365 add-on's etc) however, the bulk of the data collected by the PA apps is via syslog. &lt;BR /&gt;
(Although there are some API requests to trigger some wildfire integration - but that's pretty lightweight)&lt;/P&gt;

&lt;P&gt;I would agree with you, I would use the existing syslog-ng box as your HF&lt;/P&gt;

&lt;P&gt;Where this could be complicated however, is if you have installed a Universal Forwarder on the syslog host.&lt;/P&gt;

&lt;P&gt;The Universal Forwarder is a very lightweight Splunk implementation, and can not run TA's, so if you have a UF on that host you would want to remove it and install an HF over the top.&lt;BR /&gt;
From a cursory view of the file system there is little difference, but the HF has the UI and python framework to configure/monitor the forwarding aspects.&lt;/P&gt;

&lt;P&gt;Note an HF is &lt;EM&gt;just&lt;/EM&gt; a Splunk enterprise install, its not a separate package.&lt;/P&gt;

&lt;P&gt;A heavy forwarder does not do any 'indexing' as it's name suggests, it simply Forwards data to your Indexers.&lt;BR /&gt;
(an HF can do some event pre-processing/transforming, but indexing always happens just on the indexers)&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 10:01:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433009#M75697</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2019-03-15T10:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433010#M75698</link>
      <description>&lt;P&gt;I'm following the setup guide and it refers to 'index and forward' so that's what I'm confused about.&lt;/P&gt;

&lt;P&gt;"Use the heavy forwarder to index your data locally and to forward the data to another index."&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.4/AddPANIXC/InstallUFsyslogserver"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.4/AddPANIXC/InstallUFsyslogserver&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I'll get it setup and see how it goes.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 12:47:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433010#M75698</guid>
      <dc:creator>mikesangray</dc:creator>
      <dc:date>2019-03-15T12:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433011#M75699</link>
      <description>&lt;P&gt;I’ll raise that with the docs team, because that sentence is confusing. &lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 12:54:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433011#M75699</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2019-03-15T12:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433012#M75700</link>
      <description>&lt;P&gt;This explanation explains when using HF as a SYSLOG server.&lt;BR /&gt;
If you already have a SYSLOG server, just put the UF into the SYSLOG server and transfer the logs to the indexer. There are many such cases.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 13:27:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433012#M75700</guid>
      <dc:creator>HiroshiSatoh</dc:creator>
      <dc:date>2019-03-15T13:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433013#M75701</link>
      <description>&lt;P&gt;The setup instructions specifically call for a HF, but don't explain why.&lt;BR /&gt;
"Install a heavy forwarder on each syslog-ng server"&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.4/AddPANIXC/InstallUFsyslogserver"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.4/AddPANIXC/InstallUFsyslogserver&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;(I am the same person as OP).&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 14:43:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433013#M75701</guid>
      <dc:creator>msaz</dc:creator>
      <dc:date>2019-03-15T14:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433014#M75702</link>
      <description>&lt;P&gt;You can't install the TA on a UF - It has to be an HF.&lt;/P&gt;

&lt;P&gt;There is a danger of conflating two issues here...&lt;/P&gt;

&lt;P&gt;The Splunk_TA_paloalto is a TA which makes (if configured) outbound connections to various APIs provided by Palo Alto. It also performs extractions, provides lookups, wokflows and other configurations.&lt;BR /&gt;
For this reason, you have to install this on a full Splunk installation, which in this case should be a Heavy Forwarder.&lt;/P&gt;

&lt;P&gt;Also, because it performs ingestion transformations on the data the advice is to receive the syslog data directly on the HF, and then send it to an indexer.&lt;/P&gt;

&lt;P&gt;You &lt;STRONG&gt;COULD&lt;/STRONG&gt; send syslog events to your syslog-ng server, and use a Universal Forwarder on the syslog-ng host and &lt;STRONG&gt;THEN&lt;/STRONG&gt; send the data to an HF with the "Splunk_TA_paloalto" TA installed on it.&lt;BR /&gt;
But it is just complexity, requires another host and adds no real value.&lt;/P&gt;

&lt;P&gt;With all of the above said, and as &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/100698"&gt;@HiroshiSatoh&lt;/a&gt; comments below.&lt;BR /&gt;
Commonly, a recommended approach is to use a Universal Forwarder on a syslog server - This would ordinarily be my recommendation too, however as a real-world user of PA I would consider this a special case.&lt;BR /&gt;
PAs generate a LOT of syslog traffic, and there is a lot to be said for running a dedicated syslog server just for firewalls.&lt;BR /&gt;
In this case I would suggest following the guidance from the documentation and use a Heavy Forwarder on the syslog-server and install the TA on the same system.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:42:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433014#M75702</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2020-09-29T23:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433015#M75703</link>
      <description>&lt;P&gt;Good explanation thank you! I will follow the instructions and use a HF on syslog-ng.&lt;/P&gt;

&lt;P&gt;Does the HF index the logs and store locally on the syslog box? If so, how long do you keep the data on the syslog box?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 17:03:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433015#M75703</guid>
      <dc:creator>msaz</dc:creator>
      <dc:date>2019-03-15T17:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433016#M75704</link>
      <description>&lt;P&gt;That is bad advice.  Send to &lt;CODE&gt;syslog-ng&lt;/CODE&gt;, then use &lt;CODE&gt;Universal Forwarder&lt;/CODE&gt; (UF) &lt;EM&gt;NOT&lt;/EM&gt; &lt;CODE&gt;Heavy Forwarder&lt;/CODE&gt;.  See here:&lt;BR /&gt;
&lt;A href="https://www.splunk.com/blog/2016/12/12/universal-or-heavy-that-is-the-question.html"&gt;https://www.splunk.com/blog/2016/12/12/universal-or-heavy-that-is-the-question.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 18:51:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433016#M75704</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-03-15T18:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433017#M75705</link>
      <description>&lt;P&gt;From that link Greg,&lt;/P&gt;

&lt;P&gt;Recommendations&lt;BR /&gt;
Only use the Heavy Forwarder when:&lt;BR /&gt;
-Dropping a significant proportion of the data at source.&lt;BR /&gt;
-Complex UI or addon requirements, e.g. DBconnect, Checkpoint, Cisco IPS.&lt;BR /&gt;
-Complex (per-event) routing of the data to separate indexers or indexer clusters.&lt;/P&gt;

&lt;P&gt;The Palo Alto TA falls into the second category. &lt;/P&gt;

&lt;P&gt;As I have posted above, ordinarily I would agree with the UF approach, but like dB connect, Palo is a special case. &lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 18:59:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433017#M75705</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2019-03-15T18:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433018#M75706</link>
      <description>&lt;P&gt;Every event in the TA is assessed for sourcetype override, this is true.  But IMHO, this is best done on the Indexers, not on the HF.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 19:45:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433018#M75706</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-03-15T19:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433019#M75707</link>
      <description>&lt;P&gt;I know, it's quite a pickle, but the thing is the TA  also makes API calls to fetch results.&lt;BR /&gt;
Even if you installed the TA on the indexers you're still going to have to run a separate HF for the wilfdire are apature integrations. (you could probably get away with a stand-alone indexer with the TA, but not clustered).&lt;BR /&gt;
I think this is one of those times where there are pro's and cons for both options. I know this TA took more config than most others to get working properly in our env (albeit an inherited mess). &lt;BR /&gt;
Installing it per the Splunk spec simplified the process for us.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 20:04:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433019#M75707</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2019-03-15T20:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433020#M75708</link>
      <description>&lt;P&gt;But if your Indexers are already screaming in pain, then maybe got HF.  But in such a case, I would get more Indexers and go UF.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 20:08:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433020#M75708</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-03-15T20:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433021#M75709</link>
      <description>&lt;P&gt;Oh, if you are not using syslog and are making API calls (again, I would go syslog-ng export), then yes, you MUST use HF.  Case closed.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 20:09:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433021#M75709</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-03-15T20:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433022#M75710</link>
      <description>&lt;P&gt;What should the inputs.conf file look like on the HF? There isn't an example in the setup guide. This is how I have mine set using index=main for testing. It seems to be working.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[monitor:///var/log/syslog/pan/]
index = main
sourcetype = pan:log
no_appending_timestamp = true
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 17 Mar 2019 07:07:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433022#M75710</guid>
      <dc:creator>mikesangray</dc:creator>
      <dc:date>2019-03-17T07:07:20Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433023#M75711</link>
      <description>&lt;P&gt;A couple more items that others may find useful.&lt;/P&gt;

&lt;P&gt;For syslog-ng ; know what user the process runs as - this will set the default directory permissions (probably root). Make sure that either your HF user 'splunk' can read the log locations/files or that you set permissions in the pan.conf file. This is how the I set the perms in pan.conf.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; options{
         create_dirs(yes);
         dir_owner("splunk");
         dir_group("splunk"); 
         dir_perm(0700);
         owner("splunk");
         group("splunk"); 
         perm(0600);
 };
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Also for your syslog server, even though it isn't indexing data the syslog log files will still take up space and with a PA firewall this will grow quickly. I setup a script to run periodically to remove log files older than a couple of days.&lt;/P&gt;

&lt;P&gt;For the PA app dashboards make sure to enable Data Model acceleration as described by PA in the link.&lt;BR /&gt;
&lt;A href="https://splunk.paloaltonetworks.com/installation.html"&gt;https://splunk.paloaltonetworks.com/installation.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 14:45:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433023#M75711</guid>
      <dc:creator>msaz</dc:creator>
      <dc:date>2019-03-20T14:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto and Heavy Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433024#M75712</link>
      <description>&lt;P&gt;I'm running a single search head, indexer cluster, and syslog-ng. What is the recommendation? &lt;/P&gt;

&lt;P&gt;1) PA -&amp;gt; syslog-ng+HF -&amp;gt; idx_cluster&lt;BR /&gt;
   2) PA -&amp;gt; syslog-ng+UF -&amp;gt; idx_cluster&lt;/P&gt;

&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:39:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Palo-Alto-and-Heavy-Forwarder/m-p/433024#M75712</guid>
      <dc:creator>mikefg</dc:creator>
      <dc:date>2020-09-30T02:39:45Z</dc:date>
    </item>
  </channel>
</rss>

