- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
07-28-2011 01:36 AM
Hi,
I am using Splunk as a tool to collect and correlate logs coming from my PAN, i am trynig to configure splunkforPaloAlto Application under Splunk but i don't see the 4 types of log files (Threat, traffic, System and configuration), i'am seeing only the traffic log, i am following the configuration guide to configure this application but i can't see all the log files. I am asking if is there any psecial configuration to implement with my PAN to receive all the logs in the Splunk.
Thanks
Nicolas
08-02-2011 05:24 AM
Hi,
you can find System & Config log settings under Device tab (Log Settings).
There you can decide where to send your system and config logs.
Bye
07-28-2011 06:45 AM
You need to create a log-forwarding-profile where you specify that the traffic logs AND all of the threat logs need to be forwarded by syslog.
The you should apply this profile to all your firewall rules.
08-02-2011 12:20 AM
Hi,
When trying to create the log forwarding profile as you have explained to me, i noticed that we can associate only Threat and Traffig logs and there is no Configuration and System log, i've attached a picture to explain more the problem. Is there any other configuration to do.
Thanks
Nicolas
08-02-2011 05:24 AM
Hi,
you can find System & Config log settings under Device tab (Log Settings).
There you can decide where to send your system and config logs.
Bye
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!