All Apps and Add-ons

Not-active palo alto firewall rules into splunk

snallam123
Path Finder

We are trying to pull the firewall configurations into the spunk, but when we use the palo alto app/add-on we are getting only the rules which are actively using from the palo alto syslogs.
We have a requirement to pull all the rules into the spunk and we can get them from the pan-os-xml-api (https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-panorama-api/pan-os-xml-api-request-types/get-ac...), but trying trying to build a add-on to run the api and parse the XML data.
I tried add-on builder, it is considering all my api o/p into a single event and i can't assign fields for the each xml tag.

Any help

0 Karma
Get Updates on the Splunk Community!

Why You Can't Miss .conf25: Unleashing the Power of Agentic AI with Splunk & Cisco

The Defining Technology Movement of Our Lifetime The advent of agentic AI is arguably the defining technology ...

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...