All Apps and Add-ons

palo alto app

gisnetsec
Explorer

the palo alto app is not making use of the regular data files, can you help me to configure the data source?

0 Karma
1 Solution

kbains
Splunk Employee
Splunk Employee

sourcetype should be pan_log.

View solution in original post

kbains
Splunk Employee
Splunk Employee

sourcetype should be pan_log.

gisnetsec
Explorer

Just upgraded to 1.2 (thanks), but still no data.

0 Karma

kbains
Splunk Employee
Splunk Employee

Are you using the latest version of the app (1.2)?

0 Karma

kbains
Splunk Employee
Splunk Employee

You need to set the sourcetype to ns_log in your inputs.conf stanza. If you post your inputs.conf stanza, I can verify it is set correctly.

0 Karma

kbains
Splunk Employee
Splunk Employee

I think we should take this offline, could you email bd-labs@splunk.com and we can continue the discussion via email?

0 Karma

gisnetsec
Explorer

how is the app mapped to the ns_log sourcetype?

0 Karma

gisnetsec
Explorer

I just updated the sourcetype and here is that inputs.conf


[udp://2514]
connection_host = ip
sourcetype = ns_log
no_appending_timestamp = true

I restarted splunk an hour ago and still no data in any PaloAlto dash

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...