All Apps and Add-ons

Splunk for Palo Alto App - Peer Splunk Indexers

scottroymcse
New Member

We've recently started to change our splunk topology from a single search head / indexer, to search head and remote peer indexers.

The PAN splunk app will stay installed on the search head, however now with the traffic going to the indexers, all traffic is indexed as pan_log, however I recall a transforms.conf file that was setup in the application that would use some regex values to split up the traffic / threat / system traffic into different sourcetypes (?).

How is the PAN app supposed to work in this type of topology? Do I need to install the app on each of the indexers and have the transforms.conf copied over from the search head (original install point)?

0 Karma

kskujawa
Explorer

I installed the app on my indexer as well and can get the overview dashboard just fine, other dashboards such as Wildfire, Threat and Content are not working.

From the search head:
[REMOTE-INDEXER] The search for datamodel 'pan_logs' failed to parse, cannot get indexes to search

0 Karma

Ayn
Legend

Easiest is to just put the full app on both the indexers and your search head. As you mention yourself, there are index-time transforms in the app that need to go on the indexer. While you could of course break them out, the other stuff in the app isn't really causing any harm so the easiest (especially with regards to possible future updates of the app) is to just put the app as-is everywhere.

scottroymcse
New Member

Thanks for the response. After some investigation, it was better to take to transforms and props and bundled them into an application and deployed the files to the indexers. If I add additional indexers in the future, these changes will be pushed out automagically ..

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...