<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to filter out Informational logs from Palo Alto in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413037#M119084</link>
    <description>&lt;P&gt;Try this.&lt;/P&gt;

&lt;P&gt;props.conf file&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[pan:log]
TRANSFORMS-drop = discard-nolog, discard-info
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[discard-nolog]
REGEX = TRAFFIC.*xlog
DEST_KEY = queue
FORMAT = nullQueue

[discard-info]
REGEX = ,informational,
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 23 Apr 2019 21:53:06 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2019-04-23T21:53:06Z</dc:date>
    <item>
      <title>How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413032#M119079</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;

&lt;P&gt;I am trying to filter out Information logs from Palo Alto Firewall using REGEX with  props e transforms.conf but it is not working.&lt;/P&gt;

&lt;P&gt;Help me with the correct  REGEX.&lt;/P&gt;

&lt;P&gt;Thanks a lot!&lt;BR /&gt;
César &lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2019 11:58:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413032#M119079</guid>
      <dc:creator>cesarfabre</dc:creator>
      <dc:date>2019-04-22T11:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413033#M119080</link>
      <description>&lt;P&gt;Please provide some sample events (hide private data) and your current props and transforms settings.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2019 12:42:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413033#M119080</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-04-22T12:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413034#M119081</link>
      <description>&lt;P&gt;Hi Rich,&lt;/P&gt;

&lt;P&gt;Follows the event log:&lt;/P&gt;

&lt;P&gt;Apr 22 14:00:57 192.168.x.x  1,2019/04/22 14:00:57,001801010915,THREAT,spyware,2049,2019/04/22 14:00:57,192.168.X.X,74.125.X.X,179.191.X.X,74.125.X.X,EXIT_INTERNET,unknown,,ssl,vsys1,INTER,MUNDI,ethernet1/3.168,ethernet1/4.179,LOG-FORWARD-SPLUNK,2019/04/22 14:00:57,147775,1,51631,443,51644,443,0x423000,tcp,alert,"fonts.gstatic.com/",Suspicious TLS Evasion Found(14978),computer-and-internet-info,informational,client-to-server,73291901,0x2000000000000000,XX,United States,0,,0,,,0,,,,,,,,0,0,0,0,0,FW-XX,PA-XXXX-XXX,,,,,0,,0,,N/A,spyware,AppThreat-8144-5408,0x0,0,4294967295,&lt;BR /&gt;
host =  192.168.X.X source =    udp:5514 sourcetype =   pan:threat&lt;/P&gt;

&lt;P&gt;My current props and transforms settings:&lt;/P&gt;

&lt;P&gt;(1) props.conf file&lt;BR /&gt;
[pan:log]&lt;BR /&gt;
TRANSFORMS-drop = discard-nolog&lt;/P&gt;

&lt;P&gt;(2) transforms.conf&lt;BR /&gt;
[discard-nolog]&lt;BR /&gt;
REGEX = informational.*xlog&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;But this is not working! Not reject informational logs.&lt;/P&gt;

&lt;P&gt;Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2019 17:15:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413034#M119081</guid>
      <dc:creator>cesarfabre</dc:creator>
      <dc:date>2019-04-22T17:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413035#M119082</link>
      <description>&lt;P&gt;The &lt;CODE&gt;REGEX&lt;/CODE&gt; attribute does not match the sample event.  For an event to be rejected it must contain the two strings "informational" and "xlog" with any number of characters between them.  The sample event does not contain "xlog".&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 15:14:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413035#M119082</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-04-23T15:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413036#M119083</link>
      <description>&lt;P&gt;Hi Rich,&lt;/P&gt;

&lt;P&gt;Sorry, I made a mistake. As I'm indexing the Palo Alto logs I would like support in editing the props and transforms.conf files.&lt;/P&gt;

&lt;P&gt;My current props and transforms settings is working well with TRAFFIC filter. See:&lt;/P&gt;

&lt;P&gt;(1) props.conf file&lt;BR /&gt;
[pan:log]&lt;BR /&gt;
TRANSFORMS-drop = discard-nolog&lt;/P&gt;

&lt;P&gt;(2) transforms.conf&lt;BR /&gt;
[discard-nolog]&lt;BR /&gt;
REGEX = TRAFFIC.*xlog&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;Now I would like to also filter informational logs from Palo Alto. So, how is the REGEX for this new filter?&lt;/P&gt;

&lt;P&gt;Thanks a lot for your help!&lt;/P&gt;

&lt;P&gt;César&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 17:12:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413036#M119083</guid>
      <dc:creator>cesarfabre</dc:creator>
      <dc:date>2019-04-23T17:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413037#M119084</link>
      <description>&lt;P&gt;Try this.&lt;/P&gt;

&lt;P&gt;props.conf file&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[pan:log]
TRANSFORMS-drop = discard-nolog, discard-info
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[discard-nolog]
REGEX = TRAFFIC.*xlog
DEST_KEY = queue
FORMAT = nullQueue

[discard-info]
REGEX = ,informational,
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 23 Apr 2019 21:53:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413037#M119084</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-04-23T21:53:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413038#M119085</link>
      <description>&lt;P&gt;Hi Rich,&lt;/P&gt;

&lt;P&gt;I'm very happy, it worked. &lt;/P&gt;

&lt;P&gt;Now I will configure the email to send alerts when critical events occur.&lt;/P&gt;

&lt;P&gt;Thanks a lot!&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 12:22:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413038#M119085</guid>
      <dc:creator>cesarfabre</dc:creator>
      <dc:date>2019-04-25T12:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413039#M119086</link>
      <description>&lt;P&gt;If you are getting the PA logs via syslog, you can add a rule in your syslog [ rsyslog/syslog-ng] to allow only TRAFIC and THREAT logs and hence you can dispense the props/transforms changes.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 12:36:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413039#M119086</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-04-25T12:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413040#M119087</link>
      <description>&lt;P&gt;@cesarfabre Please accept the answer to help future readers.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 12:43:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413040#M119087</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-04-25T12:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter out Informational logs from Palo Alto</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413041#M119088</link>
      <description>&lt;P&gt;@richgalloway I accepted!!!&lt;/P&gt;

&lt;P&gt;Tks&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 16:59:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-out-Informational-logs-from-Palo-Alto/m-p/413041#M119088</guid>
      <dc:creator>cesarfabre</dc:creator>
      <dc:date>2019-04-25T16:59:24Z</dc:date>
    </item>
  </channel>
</rss>

