- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How to index the fields from the syslog messages coming from Palo Alto firewalls in version 5.0.3
Hello Splunk community,
I need to be able to run some reports that shows all traffic logged by my firewalls and provide the following fields:
Report 1:
- Source IP
- Destination IP
- Application (exclude unknown-tcp and unknown-udp)
- Action
- Count
Report 2:
- Source IP
- Destination IP
- Protocol
- Destination Port
- where Application equals unknown-tcp and/or unknown-udp
- Action
- Count
I am completely new to Splunk. I was introduced to it this Monday when I was given this task. Any assistance will be greatly appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
simple way is enable OS syslog.ng and monitoring to Splunk you see all logs on search side.
get the port number/source/sourcetype and which index they want to send data change below things accoirdingly.
source s_UDP { UDP(); };
source s_tcp { tcp(); };
destination d_hoststcp {
file("/log/syslogng/hoststcp/$HOST/$YEAR$MONTH$DAY"
owner(root) group(root) perm(0644) dir_perm(0755) create_dirs(yes));
};
add this to your splunk inputs.conf on index side .
[monitor:///log/syslogng//hosts/]
index = ur index name
sourcetype =
host_segment = 4
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
You'll want to download the "Splunk for Palo Alto Networks" app from here: http://apps.splunk.com/app/491
Once you have that and have configured it per the documentation on that same page, then the syslogs will automatically be indexed with the correct fields.
The app comes with many pre-defined dashboards and reports. But you can define your own using the Splunk search or Data Model Pivot feature.
For example, you could use the following searches to generate the reports as tables:
Report 1:
index=pan_logs sourcetype=pan_traffic (application!=unknown-tcp AND application!=unknown-udp) | stats count by src_ip dst_ip application action | sort -count
Report 2:
index=pan_logs sourcetype=pan_traffic (application=unknown-tcp OR application=unknown-udp) | stats count by src_ip dst_ip protocol dst_port application action | sort -count
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

you can download app https://apps.splunk.com/app/491/#/documentation
send syslog data from firewall and configure data inputs in splunk , see the above link in detail.
