All Apps and Add-ons

Palo Alto Networks App for Splunk: When creating a new index under the app drop-down, do you choose the PAN app or something else?

mikelauth
Explorer

When creating the new index under the app drop-down, do you choose the Pan app or something else?

ACTION REQUIRED: Create a new index called pan_logs using the Splunk GUI or on the command line. Also, in your Splunk role settings, add the pan_logs index to the list of Indexes searched by default.

0 Karma

btorresgil
Builder

You're only required to create this index if you're upgrading from Palo Alto Networks App 4.x to 5.x and you want to maintain your old logs from the previous version. The index can be created anywhere, doesn't have to be "in the App".

If this is a fresh install of the Palo Alto Networks App, than you can create any index you want to store the Palo Alto Networks logs, or just use the default index, it's up to you.

0 Karma

mikelauth
Explorer

in other words, if i search index=pan_logs host=10.10.10.10 sourcetype=pan:threat i will get current data

If i search host=10.10.10.10 sourcetype=pan:threat i get no data

0 Karma

mikelauth
Explorer

I figured it out.. If you want to index the pan you have to set the index inside the index and eventtype conf files. The other thing i noticed was if you copy and past the ENTIRE example

App version 5.x or Add-on

[udp://514]
sourcetype = pan:log
no_appending_timestamp = true

App version 4.x and 3.x

[udp://514]
index = pan_logs
sourcetype = pan_log
no_appending_timestamp = true

It sets the index to pan_logs since its not commented out. So by removing the line items for app v4 and below it removes the index and when i deleted the index i created for pan_logs making sure it goes back to "default" aka main the app starts to pick up on the logs again.
My 2 cents, there should be a section in the how to install for those who like to index per app or vendor. FireEye gives you a section for this which is how i figured all of this out.

0 Karma

mikelauth
Explorer

I guess the problem im really running into there is in the set up instructions there isnt really a place where it says do x, y, z for creating this index type so i assumed you had to create one like mentioned under upgrade. This is a fresh install and if i follow the set up instructions exactly i get no data, but if i create an index pan_logs using my standard index.conf file i can at least pull data using index=pan_logs and get a return, if i use something like host=x.x.x.x or eventtype=pan i dont get any data returned. If i remove the index of course i dont get any data out. So do i need to create event types? I see eventtypes listed when i get my index search but ONLY if i search by index=... What am i missing here

0 Karma

mikelauth
Explorer

or is this acceptable under my index.conf on my indexer?

[pan_logs]
coldPath = volume:primary/pan_logs/colddb
homePath = volume:primary/pan_logs/db
thawedPath = $SPLUNK_DB/pan_logs/thaweddb

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...