All Apps and Add-ons

Not-active palo alto firewall rules into splunk

snallam123
Path Finder

We are trying to pull the firewall configurations into the spunk, but when we use the palo alto app/add-on we are getting only the rules which are actively using from the palo alto syslogs.
We have a requirement to pull all the rules into the spunk and we can get them from the pan-os-xml-api (https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-panorama-api/pan-os-xml-api-request-types/get-ac...), but trying trying to build a add-on to run the api and parse the XML data.
I tried add-on builder, it is considering all my api o/p into a single event and i can't assign fields for the each xml tag.

Any help

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...