<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to get Splunk fields as artifacts into Phantom? in Splunk SOAR</title>
    <link>https://community.splunk.com/t5/Splunk-SOAR/How-to-get-Splunk-fields-as-artifacts-into-Phantom/m-p/417277#M79</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;trying to get Palo Alto alerts for critical, high and medium threat alerts from Splunk into Phantom.&lt;/P&gt;

&lt;P&gt;In phantom I managed to configure access to Spunk.&lt;/P&gt;

&lt;P&gt;Query:&lt;BR /&gt;
eventtype=pan* type=THREAT (severity=critical OR severity=high OR severity=medium)&lt;/P&gt;

&lt;P&gt;Fields to save:&lt;BR /&gt;
app,threat,category,dest,dest_hostname,url,log_subtype,src_user&lt;/P&gt;

&lt;P&gt;I'm getting the events into Phantom,. but the field values are all empty?&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
   Andreas&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 22:14:19 GMT</pubDate>
    <dc:creator>andreasbischoff</dc:creator>
    <dc:date>2020-09-29T22:14:19Z</dc:date>
    <item>
      <title>How to get Splunk fields as artifacts into Phantom?</title>
      <link>https://community.splunk.com/t5/Splunk-SOAR/How-to-get-Splunk-fields-as-artifacts-into-Phantom/m-p/417277#M79</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;trying to get Palo Alto alerts for critical, high and medium threat alerts from Splunk into Phantom.&lt;/P&gt;

&lt;P&gt;In phantom I managed to configure access to Spunk.&lt;/P&gt;

&lt;P&gt;Query:&lt;BR /&gt;
eventtype=pan* type=THREAT (severity=critical OR severity=high OR severity=medium)&lt;/P&gt;

&lt;P&gt;Fields to save:&lt;BR /&gt;
app,threat,category,dest,dest_hostname,url,log_subtype,src_user&lt;/P&gt;

&lt;P&gt;I'm getting the events into Phantom,. but the field values are all empty?&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
   Andreas&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:14:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-SOAR/How-to-get-Splunk-fields-as-artifacts-into-Phantom/m-p/417277#M79</guid>
      <dc:creator>andreasbischoff</dc:creator>
      <dc:date>2020-09-29T22:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Splunk fields as artifacts into Phantom</title>
      <link>https://community.splunk.com/t5/Splunk-SOAR/How-to-get-Splunk-fields-as-artifacts-into-Phantom/m-p/417278#M80</link>
      <description>&lt;P&gt;Andreas,&lt;/P&gt;

&lt;P&gt;The best practice is to use the data sources to push to Phantom verses using the app to pull.  This can be configured in the Splunk Instance by following the directions seen here: &lt;A href="https://my.phantom.us/4.1/docs/admin/splunk" target="_blank"&gt;https://my.phantom.us/4.1/docs/admin/splunk&lt;/A&gt;.  You will need to install the Splunkbase Phantom App (&lt;A href="https://splunkbase.splunk.com/app/3411/" target="_blank"&gt;https://splunkbase.splunk.com/app/3411/&lt;/A&gt;)&lt;/P&gt;

&lt;P&gt;You can still use the app, but you must ensure that you have on_poll_query  configured for 'Query to use with On Poll&lt;BR /&gt;
 and on_poll_display for Fields to save with On Poll.  Empty on_poll_display will present all the available fields configured.&lt;/P&gt;

&lt;P&gt;With that said, can you try just a basic index= search and see if that returns data?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:14:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-SOAR/How-to-get-Splunk-fields-as-artifacts-into-Phantom/m-p/417278#M80</guid>
      <dc:creator>rgresham_splunk</dc:creator>
      <dc:date>2020-09-29T22:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Splunk fields as artifacts into Phantom</title>
      <link>https://community.splunk.com/t5/Splunk-SOAR/How-to-get-Splunk-fields-as-artifacts-into-Phantom/m-p/417279#M81</link>
      <description>&lt;P&gt;Thanks a lot.&lt;/P&gt;

&lt;P&gt;I'll try it this way then.&lt;BR /&gt;
It is a bit confusing, having a Splunk app for Phantom and a Phantom app for Splunk  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
   Andreas&lt;/P&gt;</description>
      <pubDate>Mon, 03 Dec 2018 22:39:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-SOAR/How-to-get-Splunk-fields-as-artifacts-into-Phantom/m-p/417279#M81</guid>
      <dc:creator>andreasbischoff</dc:creator>
      <dc:date>2018-12-03T22:39:13Z</dc:date>
    </item>
  </channel>
</rss>

