icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Palo Alto Networks Add-on for Splunk
SHA256 checksum (palo-alto-networks-add-on-for-splunk_813.tgz) 0bd84423f6e60257c8ed740990847c55be85b3bfb1276ab1afc85c97be824bc4 SHA256 checksum (palo-alto-networks-add-on-for-splunk_811.tgz) ccfb660068ec93b453d1717b86c18cae17c984c66b3025c9f78c678386603a8f SHA256 checksum (palo-alto-networks-add-on-for-splunk_810.tgz) acd476a15418cb2e5cccb030cd1948c78a3f07583592e00a60443780f518ad33 SHA256 checksum (palo-alto-networks-add-on-for-splunk_802.tgz) b0f8c1bc66e89f455084acf9c6bf51d266062c4e95d4d866783f273223f0c3d4 SHA256 checksum (palo-alto-networks-add-on-for-splunk_710.tgz) 62f6d4d50460e429c10f6bd7ed0e68a20cbbb6034cdde59f3b9be4447ab39e68 SHA256 checksum (palo-alto-networks-add-on-for-splunk_704.tgz) 49ccf9354f987bb1a5d11fb550a0fa6d9a1bc229a5989cb1a5a5b5350521a785 SHA256 checksum (palo-alto-networks-add-on-for-splunk_703.tgz) cb96fa2f6e10f63ab167036a0ed27765720f21c7dc3242644f168758d5b95d01 SHA256 checksum (palo-alto-networks-add-on-for-splunk_702.tgz) 5928d95c81b04b050da3c33936c88e24f8fec039753a1fdda80029f04ce134ad SHA256 checksum (palo-alto-networks-add-on-for-splunk_701.tgz) 6f6e7a77bc74f88a141cb4b9c31714cc7dfbfe42697e890359adc20e050d750e SHA256 checksum (palo-alto-networks-add-on-for-splunk_662.tgz) 2421e98604158ccfb904958552d76ca15dc7979b305813ed1917a9efde74da6f SHA256 checksum (palo-alto-networks-add-on-for-splunk_700.tgz) feddb40e7356ab91425fdf0f6df576ee059c46248aa3207586816d6fbfc0ebd7 SHA256 checksum (palo-alto-networks-add-on-for-splunk_661.tgz) 80cc0b1fb7e8cc73c14cce591db4f35ad946262295fc47a1a7e705748c0e7d2f SHA256 checksum (palo-alto-networks-add-on-for-splunk_660.tgz) fbb4e2a48716d15b1c57666cb3a2ce105f0099459f8c6d459139f0422e552520 SHA256 checksum (palo-alto-networks-add-on-for-splunk_652.tgz) 4e72d5352fd9dcf8845ff1c9e5a9710f9241533376f79326c7d2c6aad914eff9 SHA256 checksum (palo-alto-networks-add-on-for-splunk_651.tgz) dd1f4c1fb5a27bb0983f04efd435786429a07219c5edeb393047af603691ec9c SHA256 checksum (palo-alto-networks-add-on-for-splunk_650.tgz) 4e120ecf7075e486ae0f7ddf532ec9c295713372059cd72982901eb16e269ebc SHA256 checksum (palo-alto-networks-add-on-for-splunk_640.tgz) d014c2f4eec2a025a29578bde4a7793ff5dd4a391105717ad52aa5c0c9b4579c SHA256 checksum (palo-alto-networks-add-on-for-splunk_631.tgz) 5b1b917afcdc843d68eb5649612bd8dd5e9e1e83cfccde93d25491df9e6157ac SHA256 checksum (palo-alto-networks-add-on-for-splunk_630.tgz) e782c8e4bcf0330513d24b23fbd36dec6d0ac898fc1dbba20eca4ac64feba72c SHA256 checksum (palo-alto-networks-add-on-for-splunk_620.tgz) 3e668afdbea763d6428fa095b92c81a3d6c22f7ff3fd3cf0146adeaedfb4c274 SHA256 checksum (palo-alto-networks-add-on-for-splunk_611.tgz) 7bfece4a720c9f446892c3133fad23514b7fe99c73cfa7f03aee8116ed9ef7de SHA256 checksum (palo-alto-networks-add-on-for-splunk_610.tgz) 6c4a74479a56204d0468b028e2ac7ccd16b0e066013e99f12f1a4555bfd0ef6e SHA256 checksum (palo-alto-networks-add-on-for-splunk_602.tgz) d98d21e9e45ff81828ccf691f0e1e0c6ea23b0a6bdef17d1e5cef8638dfe28fa SHA256 checksum (palo-alto-networks-add-on-for-splunk_601.tgz) 84027e56656e6747eaca556ab825744b584c63b968c00161b008ef6e68cc3889 SHA256 checksum (palo-alto-networks-add-on-for-splunk_600.tgz) 37c1b3e0b5f79d4885b9c936ce09c35ed07047da122dcd3aea30cbac3d9cfb43 SHA256 checksum (palo-alto-networks-add-on-for-splunk_382.tgz) 2fc2124e7030cf5b79fb1b09fc733a657e9c921a62a98442e27feda0b38d3c9d SHA256 checksum (palo-alto-networks-add-on-for-splunk_381.tgz) f54d19a98f14139fef164738ac1f6d2cf8019ea5b17f2fa4800d3f600bbd1a90 SHA256 checksum (palo-alto-networks-add-on-for-splunk_380.tgz) 01ff8b63c024bcd17bfbd3678d5b45267ec818f88768ac78665075e27e358833 SHA256 checksum (palo-alto-networks-add-on-for-splunk_371.tgz) 5544e6144691d68335a2599efd9088816d530103d84c14064949715a8013d342 SHA256 checksum (palo-alto-networks-add-on-for-splunk_361.tgz) 110930e344bd23d84d62a39d962505105e3e687d90c4b71968d1cb286a9cba2d SHA256 checksum (palo-alto-networks-add-on-for-splunk_360.tgz) c2cf059e0f4063b39b7d5c3c7cfda1bce2edbf1f801cf71270cfbb0422ccdb49 SHA256 checksum (palo-alto-networks-add-on-for-splunk_352.tgz) fb965974190a01ace61383f4470c65a08badabef09e0437ff2c2754413c76414 SHA256 checksum (palo-alto-networks-add-on-for-splunk_351.tgz) d3a1e05e85242aa4908afc6af08c1e591e42ba915f2d8d6c018b6d1a7f9775ad SHA256 checksum (palo-alto-networks-add-on-for-splunk_350.tgz) ec7229b853eee3d619d40f38096e8269c8c724844f99a9dd7a7f598d1a285246
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Palo Alto Networks Add-on for Splunk

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
The Palo Alto Networks Add-on for Splunk has been deprecated and will soon be archived. View Details page for more information.

The Palo Alto Networks Add-on for Splunk has been deprecated and will soon be archived. You should use the Splunk supported, Splunk Add-on for Palo Alto Networks.

Please follow the documentation for a migration path to use the Splunk supported Splunk Add-on for Palo Alto Networks.

Support

Release Notes

Authors

Palo Alto Networks

  • Brian Torres-Gil
  • Paul Nguyen
  • Garfield Freeman

Release Notes

Version 8.1.3
May 24, 2024
Version 8.1.1
Nov. 8, 2023
Version 8.1.0
May 19, 2023
Version 8.0.2
March 24, 2023
Version 7.1.0
April 20, 2022
Version 7.0.4
Dec. 27, 2021
Version 7.0.3
Sept. 28, 2021
Version 7.0.2
Sept. 11, 2021
Version 7.0.1
May 26, 2021
Version 6.6.2
May 26, 2021
Version 7.0.0
May 14, 2021
Version 6.6.1
May 8, 2021
Version 6.6.0
April 1, 2021
Version 6.5.2
March 31, 2021
Version 6.5.1
March 14, 2021
Version 6.5.0
Oct. 30, 2020

Features

  • app/addon: Tag to Dynamic User Group
  • app/addon: Update pandevice to 0.14.0

Bug Fixes

  • addon: Remove the 'state_change_requires_restart' flag
Version 6.4.0
Sept. 21, 2020

Features

  • addon: Decryption Log Support

Bug Fixes

  • addon: Fix Remove port from dest_name field
Version 6.3.1
Aug. 11, 2020

Bug Fixes

  • addon: Fix parser for GlobalProtect 9.1 log sourcetype
Version 6.3.0
Aug. 7, 2020

Features

- app/addon: Python 3 Support
- app/addon: Support GlobalProtect log type in PANOS 9.1

Bug Fixes

- addon: Fix appserver/static files
Version 6.2.0
Feb. 25, 2020

Version 6.2.0
- New: Palo Alto Networks Logo
- Fix: Improved Transform of Traps Analytics Logs
- Fix: Removed of deprecated "NewApp" API call to Applipedia
Version 6.1.1
- Fix: Improved API call to Aperture
- Fix: Aperture region field no longer ignored
- Fix: Traps event types updated
- Fix: Improved clustered environment support

Version 6.1.0
- New: Support for Traps 5.0 (Traps Management Service)
- New: Support for Firewall User-ID logs
- New: Credential Detected flag for PAN-OS 8.1
- New: MineMeld indicator retention timer
- New: Batch collection of Aperture logs
- New: Support all Aperture regions
- New: Easier to disable certificate validation for self-hosted MineMeld
- New: Malicious WildFire events tagged for Malware CIM datamodel
- Fix: category field for URL logs is now more consistent
- Fix: url_length field fixed
- Fix: Corrected the double parse of Aperture logs

Potentially breaking changes:
- Traps datamodel has been renamed from pan_endpoint to pan_traps

Version 6.1.1
Feb. 20, 2019

Version 6.1.1
- Fix: Improved API call to Aperture
- Fix: Aperture region field no longer ignored
- Fix: Traps event types updated
- Fix: Improved clustered environment support

Version 6.1.0
- New: Support for Traps 5.0 (Traps Management Service)
- New: Support for Firewall User-ID logs
- New: Credential Detected flag for PAN-OS 8.1
- New: MineMeld indicator retention timer
- New: Batch collection of Aperture logs
- New: Support all Aperture regions
- New: Easier to disable certificate validation for self-hosted MineMeld
- New: Malicious WildFire events tagged for Malware CIM datamodel
- Fix: category field for URL logs is now more consistent
- Fix: url_length field fixed
- Fix: Corrected the double parse of Aperture logs

Potentially breaking changes:
- Traps datamodel has been renamed from pan_endpoint to pan_traps

Version 6.1.0
Oct. 26, 2018
  • New: Support for Traps 5.0 (Traps Management Service)
  • New: Support for Firewall User-ID logs
  • New: Credential Detected flag for PAN-OS 8.1
  • New: MineMeld indicator retention timer
  • New: Batch collection of Aperture logs
  • New: Support all Aperture regions
  • New: Easier to disable certificate validation for self-hosted MineMeld
  • New: Malicious WildFire events tagged for Malware CIM datamodel
  • Fix: category field for URL logs is now more consistent
  • Fix: url_length field fixed
  • Fix: Corrected the double parse of Aperture logs

Potentially breaking changes:
- Traps datamodel has been renamed from pan_endpoint to pan_traps

Version 6.0.2
Dec. 27, 2017

v.6.0.2
* threat_list.csv and app_list.csv updated.

v.6.0.1
* Fixed threat list warning message

v6.0.0
MineMeld Support
AutoFocus Tags Support
Aperture Support
PAN-OS 8.0 new fields
Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 6.0.1
Nov. 21, 2017

v.6.0.1
* Fixed threat list warning message

v6.0.0
MineMeld Support
AutoFocus Tags Support
Aperture Support
PAN-OS 8.0 new fields
Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 6.0.0
Nov. 10, 2017

v6.0.0
* MineMeld Support
* AutoFocus Tags Support
* Aperture Support
* PAN-OS 8.0 new fields
* Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
* Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 3.8.2
Aug. 4, 2017

v3.8.2
* Improved CIM support for correlation log.

v3.8.1
* Configuration screen bug fix

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.1
June 29, 2017

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.0
April 28, 2017

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.7.1
Nov. 7, 2016

v3.7.1
- Changes made to meet new certification requirements

v3.7.0
- Integration with new Splunk Adaptive Response
- Tag to dynamic address group using modular actions and Adaptive Response
- Submit URL’s from any log in Splunk to WildFire
- Logs with malware hashes have a new event action that links directly to that hash in Autofocus
- Improved tagging for Splunk Enterprise Security, based on customer feedback
- New parser for GlobalProtect logs

Important Add-on Upgrade Notes
- Eventtype pan_threat no longer includes these log_subtypes: url, data, file, and wildfire. You might need to update custom searches or panels you created that leverage the pan_threat eventtype. There are new eventtypes for each of the removed log_subtypes: pan_url, pan_data, pan_file, and pan_wildfire.

Version 3.6.1
July 7, 2016
  • Add-on Certified by Splunk
Version 3.6.0
April 22, 2016
  • Support new Traps 3.3.2 log format

WARNING: Traps versions before 3.3.2 are no longer supported beginning with this Add-on version

Version 3.5.2
Feb. 3, 2016
  • Fix issue where endpoint logs would show up in CIM apps, but not Palo Alto Networks app
Version 3.5.1
Nov. 13, 2015
  • Add support for PAN-OS 7.0 new fields
  • Add hip-match log type from Firewall and Panorama
  • Add sourcetype category
  • Add Sanctioned SaaS lookup table
  • Update app_list.csv and threat_list.csv lookup tables with new format and data
  • Fix incorrect value in report_id field for Wildfire logs in PAN-OS 6.1 or higher
  • Fix src_category field should be dest_category
Version 3.5.0
May 28, 2015

Splunk Add-on for Palo Alto Networks 3.5.0. Copyright (C) 2014-2015 Splunk Inc. All rights reserved.

This new Add-on (TA) for Palo Alto Networks supports logs from Palo Alto Networks Next-generation Firewall, Panorama, and Traps Endpoint Security Manager. It is CIM 4.x compliant and designed to work with Splunk Enterprise Security 4 and the Palo Alto Networks App for Splunk v5.0.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.