All Apps and Add-ons

Not-active palo alto firewall rules into splunk

snallam123
Path Finder

We are trying to pull the firewall configurations into the spunk, but when we use the palo alto app/add-on we are getting only the rules which are actively using from the palo alto syslogs.
We have a requirement to pull all the rules into the spunk and we can get them from the pan-os-xml-api (https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-panorama-api/pan-os-xml-api-request-types/get-ac...), but trying trying to build a add-on to run the api and parse the XML data.
I tried add-on builder, it is considering all my api o/p into a single event and i can't assign fields for the each xml tag.

Any help

0 Karma
Get Updates on the Splunk Community!

Splunk Search APIを使えば調査過程が残せます

   このゲストブログは、JCOM株式会社の情報セキュリティ本部・専任部長である渡辺慎太郎氏によって執筆されました。 Note: This article is published in both Japanese ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...