My question is probably related to the (unanswered) question: http://answers.splunk.com/answers/219615/why-is-the-splunk-for-palo-alto-networks-app-not-p.html
I have a single Palo Alto forwarder from which I am sending the logs to an index (one of two) and then searching the data at the search head. I installed the Palo Alto app straight from the apps.splunk.com and the default has appeared to work just fine until now.
Today I noticed that it appears the parsing is not working properly. If I use the following search:
index=pan_logs sourcetype="pan_traffic" 10.10.10.10
the search results are parsed correctly with extractions and labels and such, but if I just search for
10.10.10.10
and I have results from a variety of sources and source types, any results from with sourcetype 'pan_traffic', are NOT parsed at all, do not have any labels and data extracted beyond the very basic syslog parsing:
Selected host 10.10.10.10
source udp:6514
sourcetype pan_traffic
Event eventtype pan
pan_traffic
index pan_logs
linecount 1
splunk_server SPLUNK.xxx.xxx
Time
_time 2015-07-22T13:36:30.000-04:00
Default punct __::_--.-._,//_::,,,,,//_::,...,...,...,...,__,..\
This makes it hard to correlate the actions of the IP I'm searching for with other events from other sourcetypes.
Any idea what is going on? We need to be able to search a single data point and view the results from all sourcetypes with that data point to get a story of what that data point is doing.
Thanks.
... View more