<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Monitoring Palo DB cloud service in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/monitoring-palo-db-cloud-service/m-p/588622#M117352</link>
    <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; We recently encountered an issue where our firewalls got disconnected from Palo DB cloud database, the was due to a known issue in Palo OS we are running. I am looking for a way to monitor Palo DB cloud connectivity. We do not have solarwinds otherwise I would have used an OID to monitor that specific service.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to still monitor Palo DB connectivity like forwarding the logs to Splunk and then generating an email from there to all the stakeholders&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for any recommendations&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Jun 2024 17:38:46 GMT</pubDate>
    <dc:creator>Ironsecurity</dc:creator>
    <dc:date>2024-06-03T17:38:46Z</dc:date>
    <item>
      <title>Monitoring Palo DB cloud service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/monitoring-palo-db-cloud-service/m-p/588622#M117352</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; We recently encountered an issue where our firewalls got disconnected from Palo DB cloud database, the was due to a known issue in Palo OS we are running. I am looking for a way to monitor Palo DB cloud connectivity. We do not have solarwinds otherwise I would have used an OID to monitor that specific service.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to still monitor Palo DB connectivity like forwarding the logs to Splunk and then generating an email from there to all the stakeholders&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for any recommendations&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 17:38:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/monitoring-palo-db-cloud-service/m-p/588622#M117352</guid>
      <dc:creator>Ironsecurity</dc:creator>
      <dc:date>2024-06-03T17:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring Palo DB cloud service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/monitoring-palo-db-cloud-service/m-p/588633#M117353</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/96531353"&gt;@Ironsecurity&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Generally speaking this would be wrapped up in monitoring system events and either having the firewall send an email/http alert itself or forwarding the events to something like Splunk/Graylog and setting up desired alerts there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The majority of cloud connection issues are going to be in system logs if you utilize this filter:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;(severity eq medium) and (eventid eq 'general')&lt;/LI-CODE&gt;
&lt;P&gt;Fair warning that this doesn't limit things to cloud connection issues and you might have events you want to exclude, but you would just adjust the query. This will cover download failures, upgrade failures, and stuff like that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN has a special subtype named 'dyanmic-updates' but note that this isn't utilized for anything other then messages that they deem worth sending out. I would personally think you likely want those as well, but I would also say you should be receiving an email notification for anything with a severity of high or greater for your firewall (severity geq high).&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 19:18:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/monitoring-palo-db-cloud-service/m-p/588633#M117353</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-06-03T19:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring Palo DB cloud service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/monitoring-palo-db-cloud-service/m-p/588860#M117387</link>
      <description>&lt;P&gt;Thanks that helped, i was able to filter out specific eventid's with below filter&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;( eventid eq cloud-election ) or ( eventid eq url-cloud-connection-failure)&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are certain informational logs that are not being forwarded to Splunk, but i see it in Palo Alto, I am still figuring that part out.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 17:05:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/monitoring-palo-db-cloud-service/m-p/588860#M117387</guid>
      <dc:creator>Ironsecurity</dc:creator>
      <dc:date>2024-06-05T17:05:55Z</dc:date>
    </item>
  </channel>
</rss>

