All Apps and Add-ons

Not-active palo alto firewall rules into splunk

snallam123
Path Finder

We are trying to pull the firewall configurations into the spunk, but when we use the palo alto app/add-on we are getting only the rules which are actively using from the palo alto syslogs.
We have a requirement to pull all the rules into the spunk and we can get them from the pan-os-xml-api (https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-panorama-api/pan-os-xml-api-request-types/get-ac...), but trying trying to build a add-on to run the api and parse the XML data.
I tried add-on builder, it is considering all my api o/p into a single event and i can't assign fields for the each xml tag.

Any help

0 Karma
Get Updates on the Splunk Community!

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

The Latest Cisco Integrations With Splunk Platform!

Join us for an exciting tech talk where we’ll explore the latest integrations in Cisco + Splunk! We’ve ...

AI Adoption Hub Launch | Curated Resources to Get Started with AI in Splunk

Hey Splunk Practitioners and AI Enthusiasts! It’s no secret (or surprise) that AI is at the forefront of ...