<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to capture URL information in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271652#M176322</link>
    <description>&lt;P&gt;Hello Skoelpin,&lt;/P&gt;

&lt;P&gt;Thank You for your response. &lt;/P&gt;

&lt;P&gt;Here is the 2 sample data:   Just have replaced some information with &amp;lt;&amp;gt;.  &lt;/P&gt;

&lt;P&gt;Hope it helps to extract the URL field using a regular expression . If not, please let me know any specific sample you need.&lt;/P&gt;

&lt;P&gt;========================&lt;BR /&gt;
2016-10-25T10:57:02+00:00  Palo Alto Networks|PAN-OS Syslog Integration|4.0|&lt;BR /&gt;
deny|cat=TRAFFIC|src=|dst=|srcPort=&amp;lt;&amp;gt;|dstPort=23|proto=tcp|usrName=|&lt;BR /&gt;
 SerialNumber=007801003272|Type=TRAFFIC|Subtype=drop|srcPostNAT=0.0.0.0|dstPostNAT=0.0.0.0|RuleName=DENY-ALL|&lt;BR /&gt;
SourceUser=|DestinationUser=|Application=not-applicable| VirtualSystem=&amp;lt;&amp;gt;|SourceZone=internet|DestinationZone=public03|&lt;BR /&gt;
IngressInterface=&amp;lt;&amp;gt;|EgressInterface=|LogForwardingProfile=log-all-to-panorama-and-ext|SessionID=0|RepeatCount=1|srcPostNATPort=0|&lt;BR /&gt;
dstPostNATPort=0|Flags=0x0|totalBytes=64|totalPackets=1|ElapsedTime=0|URLCategory=any|dstBytes=0|srcBytes=64|action=deny&lt;/P&gt;

&lt;P&gt;========================================================&lt;/P&gt;

&lt;P&gt;2016-10-25T10:57:02+00:00  Palo Alto Networks|PAN-OS Syslog Integration|4.0|allow|cat=TRAFFIC|src=|dst=|srcPort=&amp;lt;&amp;gt;|dstPort=443|proto=tcp|usrName=| SerialNumber=007801003272|Type=TRAFFIC|Subtype=end|srcPostNAT=|dstPostNAT=|RuleName=5-1|SourceUser=|DestinationUser=|Application=google-base| VirtualSystem=vsys1|SourceZone=office|DestinationZone=internet|IngressInterface=ae2.431|EgressInterface=ae1.633|LogForwardingProfile=log-all-to-panorama-and-ext|SessionID=76241|RepeatCount=1|&lt;BR /&gt;
srcPostNATPort=&amp;lt;&amp;gt;|dstPostNATPort=443|Flags=0x40001a|totalBytes=2067|totalPackets=18|ElapsedTime=126|URLCategory=search-engines|dstBytes=770|srcBytes=1297|action=allow&lt;/P&gt;

&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;
Binay Agarwal &lt;/P&gt;</description>
    <pubDate>Tue, 25 Oct 2016 15:04:41 GMT</pubDate>
    <dc:creator>bagarwal</dc:creator>
    <dc:date>2016-10-25T15:04:41Z</dc:date>
    <item>
      <title>How to capture URL information</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271650#M176320</link>
      <description>&lt;P&gt;Hello All, &lt;/P&gt;

&lt;P&gt;I want to create a report for top 10 URL's visited by the users.  However, when I see the events in PaloAlto Firewall , I don't see any fields containing URL information though there is URL category field.    &lt;/P&gt;

&lt;P&gt;e.g. in URL category field  I am getting as "computer -and internet-info"  , but I want specific URL information e.g.  *.dell.com or *.net or *.saas.hp.com/  something like this. &lt;/P&gt;

&lt;P&gt;Can any please help how to get the URL information in firewall events so I can pull the data and create the report. &lt;/P&gt;

&lt;P&gt;Thanks in advance&lt;/P&gt;

&lt;P&gt;Binay Agarwal &lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2016 11:15:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271650#M176320</guid>
      <dc:creator>bagarwal</dc:creator>
      <dc:date>2016-10-25T11:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture URL information</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271651#M176321</link>
      <description>&lt;P&gt;Hello @bagarwal, you will need to extract the field using a regular expression. Post a sample of your data and I will help you write the search &lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2016 11:50:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271651#M176321</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2016-10-25T11:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture URL information</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271652#M176322</link>
      <description>&lt;P&gt;Hello Skoelpin,&lt;/P&gt;

&lt;P&gt;Thank You for your response. &lt;/P&gt;

&lt;P&gt;Here is the 2 sample data:   Just have replaced some information with &amp;lt;&amp;gt;.  &lt;/P&gt;

&lt;P&gt;Hope it helps to extract the URL field using a regular expression . If not, please let me know any specific sample you need.&lt;/P&gt;

&lt;P&gt;========================&lt;BR /&gt;
2016-10-25T10:57:02+00:00  Palo Alto Networks|PAN-OS Syslog Integration|4.0|&lt;BR /&gt;
deny|cat=TRAFFIC|src=|dst=|srcPort=&amp;lt;&amp;gt;|dstPort=23|proto=tcp|usrName=|&lt;BR /&gt;
 SerialNumber=007801003272|Type=TRAFFIC|Subtype=drop|srcPostNAT=0.0.0.0|dstPostNAT=0.0.0.0|RuleName=DENY-ALL|&lt;BR /&gt;
SourceUser=|DestinationUser=|Application=not-applicable| VirtualSystem=&amp;lt;&amp;gt;|SourceZone=internet|DestinationZone=public03|&lt;BR /&gt;
IngressInterface=&amp;lt;&amp;gt;|EgressInterface=|LogForwardingProfile=log-all-to-panorama-and-ext|SessionID=0|RepeatCount=1|srcPostNATPort=0|&lt;BR /&gt;
dstPostNATPort=0|Flags=0x0|totalBytes=64|totalPackets=1|ElapsedTime=0|URLCategory=any|dstBytes=0|srcBytes=64|action=deny&lt;/P&gt;

&lt;P&gt;========================================================&lt;/P&gt;

&lt;P&gt;2016-10-25T10:57:02+00:00  Palo Alto Networks|PAN-OS Syslog Integration|4.0|allow|cat=TRAFFIC|src=|dst=|srcPort=&amp;lt;&amp;gt;|dstPort=443|proto=tcp|usrName=| SerialNumber=007801003272|Type=TRAFFIC|Subtype=end|srcPostNAT=|dstPostNAT=|RuleName=5-1|SourceUser=|DestinationUser=|Application=google-base| VirtualSystem=vsys1|SourceZone=office|DestinationZone=internet|IngressInterface=ae2.431|EgressInterface=ae1.633|LogForwardingProfile=log-all-to-panorama-and-ext|SessionID=76241|RepeatCount=1|&lt;BR /&gt;
srcPostNATPort=&amp;lt;&amp;gt;|dstPostNATPort=443|Flags=0x40001a|totalBytes=2067|totalPackets=18|ElapsedTime=126|URLCategory=search-engines|dstBytes=770|srcBytes=1297|action=allow&lt;/P&gt;

&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;
Binay Agarwal &lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2016 15:04:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271652#M176322</guid>
      <dc:creator>bagarwal</dc:creator>
      <dc:date>2016-10-25T15:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture URL information</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271653#M176323</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;To get URL's in Splunk from a Palo Alto Networks Next-generation Firewall, you need to send URL logs to Splunk:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Install a URL-Filtering license on the firewall&lt;/LI&gt;
&lt;LI&gt;Create a URL-Filtering security profile with all categories set to 'alert' or some other action besides 'allow'  (allow does not produce a log)&lt;/LI&gt;
&lt;LI&gt;Assign the URL-Filtering profile to a security rule that sees the traffic you want to log.&lt;/LI&gt;
&lt;LI&gt;Assign the Log Forwarding profile you created for Splunk to the same rule.&lt;/LI&gt;
&lt;LI&gt;Commit the configuration&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Assuming you installed the Palo Alto Networks Add-on for Splunk, view the URL logs with this search:&lt;/P&gt;

&lt;P&gt;eventtype=pan log_subtype=url | table dest_hostname url&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:35:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271653#M176323</guid>
      <dc:creator>btorresgil</dc:creator>
      <dc:date>2020-09-29T11:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture URL information</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271654#M176324</link>
      <description>&lt;P&gt;Hello @skoelpin ,  &lt;/P&gt;

&lt;P&gt;Can you please help in writing the regex or do you need any more details. &lt;/P&gt;

&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;
Binay Agarwal &lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 09:59:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271654#M176324</guid>
      <dc:creator>bagarwal</dc:creator>
      <dc:date>2016-10-28T09:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture URL information</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271655#M176325</link>
      <description>&lt;P&gt;Hi @btorresgil, &lt;/P&gt;

&lt;P&gt;Thank You for your response.  Will try this also &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  However,  would be prefer to get the URL links and view without using Palo Alto Networks App. &lt;/P&gt;

&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;
Binay Agarwal &lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 10:01:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271655#M176325</guid>
      <dc:creator>bagarwal</dc:creator>
      <dc:date>2016-10-28T10:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture URL information</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271656#M176326</link>
      <description>&lt;P&gt;Hi Binay, you don't need to use the App, just the Add-on.  The Add-on simply contains an optimized props.conf and transforms.conf for parsing the default Palo Alto Networks logs.  It will not slow down your Splunk instance, it just does all the parsing work for you so you don't have to create a parser or a custom log format.  Creating a regex yourself would by much slower to process every log than the methods used in the Add-on.&lt;/P&gt;

&lt;P&gt;Palo Alto Networks Add-on:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/2757/"&gt;https://splunkbase.splunk.com/app/2757/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 17:19:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271656#M176326</guid>
      <dc:creator>btorresgil</dc:creator>
      <dc:date>2016-10-28T17:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture URL information</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271657#M176327</link>
      <description>&lt;P&gt;To add - &lt;/P&gt;

&lt;P&gt;In order to forward URL logs, it is necessary to forward Threat logs of Severity 'informational' to the Syslog server on the PaloAlto server.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2017 21:58:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-capture-URL-information/m-p/271657#M176327</guid>
      <dc:creator>pj</dc:creator>
      <dc:date>2017-11-29T21:58:49Z</dc:date>
    </item>
  </channel>
</rss>

