All Apps and Add-ons

Palo Alto Networks App for Splunk: In real time search, how to drop known false positives?

BrendanCO
Path Finder

Hello all! So I've got some Palo Altos forwarding their syslogs over to my Splunk instance. I want to receive alerts on High and Critical findings. That works like a charm with the following parameters:

sourcetype="pan:threat" severity=high

Pretty simple. However, I'm getting a lot of traffic that I know to be false positives, and it is completely using up my disk space and making me hit up against the license max. Is there a way to drop certain events and not alert or log on them as they come in?

Here's some internal traffic that is known-good.
https://imgur.com/ErIyf1i

That is a perfect example of something I would just like Splunk to see and discard immediately.

Thanks in advance

0 Karma

HiroshiSatoh
Champion

Discard specific events and keep the rest

http://docs.splunk.com/Documentation/Splunk/7.0.2/Forwarding/Routeandfilterdatad

Since I think that "pan: log" is set, it is necessary to change the setting file of "Palo Alto Networks Add-on for Splunk".

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...