icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Palo Alto Networks Add-on for Splunk
SHA256 checksum (palo-alto-networks-add-on-for-splunk_813.tgz) 17e7c60ebd8c153a7905723d5333a0668a6a5f668ad747e2da2d6b4250427b7e SHA256 checksum (palo-alto-networks-add-on-for-splunk_811.tgz) 7fe0f70a468ffeec0c753c0472e577cc3eb2ae8bc62e5dcf8a14af126c08fa23 SHA256 checksum (palo-alto-networks-add-on-for-splunk_810.tgz) 54612965c838eb6d6a6f4a1afd47f5a6f1375d228abfd6bc1f40ee7fabe63bc4 SHA256 checksum (palo-alto-networks-add-on-for-splunk_802.tgz) 226bbf9644d173bf2c00900884b27ba0851120dfe0b61c543fd343d8c45e7399 SHA256 checksum (palo-alto-networks-add-on-for-splunk_710.tgz) 65096d52a8e379a9f2207bae3dfdd99b444598536e301adffca23293b780b793 SHA256 checksum (palo-alto-networks-add-on-for-splunk_704.tgz) 28166b3497ec086392c65cad0f54ac323c92537c34040828af8a66e917d7ae04 SHA256 checksum (palo-alto-networks-add-on-for-splunk_703.tgz) be0f40ae12acc29784703525826bf46e77c1e4ba5df1a638d34d9fa0959966a4 SHA256 checksum (palo-alto-networks-add-on-for-splunk_702.tgz) 888651f69063a84c641ccb90d8d8d6d26d338d50d5a0088bc37b2316d2a42f6d SHA256 checksum (palo-alto-networks-add-on-for-splunk_701.tgz) c19d05dbe6c5dbbbaf288ae8c8e87b3d4b1b9e00c5fd4c6396c6f77716c7bb0d SHA256 checksum (palo-alto-networks-add-on-for-splunk_662.tgz) 659059ca0439258f39566545c3dc0cd20eb9965d70656f813f46644bed14c451 SHA256 checksum (palo-alto-networks-add-on-for-splunk_700.tgz) 2560e06ea640e0fbb22ba94b6e268f4cba3b6c385604cd895870b84b823bdbaa SHA256 checksum (palo-alto-networks-add-on-for-splunk_661.tgz) 0bec54eeace3a3da3a4b8002e1b5abd9e83bedeafde9b5262f8cfb4cf8933f46 SHA256 checksum (palo-alto-networks-add-on-for-splunk_660.tgz) aebdeb2c2a640ab468398906eaa62626b205a164fc8b0a842315c4b5d2f2d8d4 SHA256 checksum (palo-alto-networks-add-on-for-splunk_652.tgz) 909143aa5aa38189974ed9ffc76eaa0e9a5cebb318414b17432ddf21aeb9d9b9 SHA256 checksum (palo-alto-networks-add-on-for-splunk_651.tgz) 8680261fa0353032fd13c7f7c153f704a9bc343a0c60a9b14dc30e9913c9b122 SHA256 checksum (palo-alto-networks-add-on-for-splunk_650.tgz) a54b1f21ef44008a3e0617d87830408f5aac05a743500c5a3e0df90474d497d1 SHA256 checksum (palo-alto-networks-add-on-for-splunk_640.tgz) 6047b8f6a81cc79d3b70288e8a951d81febe1641b89bc079413b4c38cd5fbd23 SHA256 checksum (palo-alto-networks-add-on-for-splunk_631.tgz) 1becc29d2e69a6e6fb14ef21806b92b8d7317839f1f765475161631ee36a9ecd SHA256 checksum (palo-alto-networks-add-on-for-splunk_630.tgz) 95426e5732c757e384b08d40b407831025ca251c7dee998e0c301492e5e9c658 SHA256 checksum (palo-alto-networks-add-on-for-splunk_620.tgz) 0179f69b146ea41545eaa0a2d245693fc3caf7b163a204562944fa11f8aa3bad SHA256 checksum (palo-alto-networks-add-on-for-splunk_611.tgz) 4f45025a8b728c2c2123c051ca22a7492bd2ac57d891ec49cb08d52901c552cc SHA256 checksum (palo-alto-networks-add-on-for-splunk_610.tgz) 4d5dc43259a41bae5e3c9d1f0de91c558a1079d4278d41ca268e6af743dc6373 SHA256 checksum (palo-alto-networks-add-on-for-splunk_602.tgz) b85eaea66f45a444247c17e48f3738c53d8379f3d274d3d519a93ff1eb49582c SHA256 checksum (palo-alto-networks-add-on-for-splunk_601.tgz) b86eb32be4578ca5698d7ea947d7665581e0b22677b4d168c7feb239a050cfe9 SHA256 checksum (palo-alto-networks-add-on-for-splunk_600.tgz) 4ea2be1b1a7561c10a463b0b515bbcb50737d5c08998e582b77cc97c8ad01978 SHA256 checksum (palo-alto-networks-add-on-for-splunk_382.tgz) b653dc4180157ca4c8f758ecc14af31eb2f40dc0ceb963c780841142543e8392 SHA256 checksum (palo-alto-networks-add-on-for-splunk_381.tgz) 1eede646050d41dbf62fc96eff8e1edf58337c56c34b71a36f03570a56c90faf SHA256 checksum (palo-alto-networks-add-on-for-splunk_380.tgz) a1b1a7b42acf3ec857ec0431fc0d50293f127dcbf764facc6a24669fc16c1512 SHA256 checksum (palo-alto-networks-add-on-for-splunk_371.tgz) 6aaf7ab10ca1c09c748c47b13d4872f7fc5f6d1f3a7b5d35e0a0daea2ed39205 SHA256 checksum (palo-alto-networks-add-on-for-splunk_361.tgz) d62dafbbd0377798e8e9757ebbaa2241bcd92b2ee140dc02a6d01e5a236ae0ec SHA256 checksum (palo-alto-networks-add-on-for-splunk_360.tgz) 06904f3fda965e0d8987b2c5e55ec7b079129e9d7e212d4ffe684a4ef87ea75e SHA256 checksum (palo-alto-networks-add-on-for-splunk_352.tgz) f260a9997283c8e82a7138d8e080a154ed85fe2a75f29da386e72b82ec12d737 SHA256 checksum (palo-alto-networks-add-on-for-splunk_351.tgz) 2e772707480e1f189d2335eea875c904a8a8e33be9e5a288929eb52809244a61 SHA256 checksum (palo-alto-networks-add-on-for-splunk_350.tgz) 508a31be614f75f4ce734b835b0b05c6b6e6076a4d2b33d4c2ec27074b95d9b9
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Palo Alto Networks Add-on for Splunk

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
The Palo Alto Networks Add-on for Splunk has been deprecated and will soon be archived. View Details page for more information.

The Palo Alto Networks Add-on for Splunk has been deprecated and will soon be archived. You should use the Splunk supported, Splunk Add-on for Palo Alto Networks.

Please follow the documentation for a migration path to use the Splunk supported Splunk Add-on for Palo Alto Networks.

Support

Release Notes

Authors

Palo Alto Networks

  • Brian Torres-Gil
  • Paul Nguyen
  • Garfield Freeman

Release Notes

Version 8.1.3
May 24, 2024
Version 8.1.1
Nov. 8, 2023
Version 8.1.0
May 19, 2023
Version 8.0.2
March 24, 2023
Version 7.1.0
April 20, 2022
Version 7.0.4
Dec. 27, 2021
Version 7.0.3
Sept. 28, 2021
Version 7.0.2
Sept. 11, 2021
Version 7.0.1
May 26, 2021
Version 6.6.2
May 26, 2021
Version 7.0.0
May 14, 2021
Version 6.6.1
May 8, 2021
Version 6.6.0
April 1, 2021
Version 6.5.2
March 31, 2021
Version 6.5.1
March 14, 2021
Version 6.5.0
Oct. 30, 2020

Features

  • app/addon: Tag to Dynamic User Group
  • app/addon: Update pandevice to 0.14.0

Bug Fixes

  • addon: Remove the 'state_change_requires_restart' flag
Version 6.4.0
Sept. 21, 2020

Features

  • addon: Decryption Log Support

Bug Fixes

  • addon: Fix Remove port from dest_name field
Version 6.3.1
Aug. 11, 2020

Bug Fixes

  • addon: Fix parser for GlobalProtect 9.1 log sourcetype
Version 6.3.0
Aug. 7, 2020

Features

- app/addon: Python 3 Support
- app/addon: Support GlobalProtect log type in PANOS 9.1

Bug Fixes

- addon: Fix appserver/static files
Version 6.2.0
Feb. 25, 2020

Version 6.2.0
- New: Palo Alto Networks Logo
- Fix: Improved Transform of Traps Analytics Logs
- Fix: Removed of deprecated "NewApp" API call to Applipedia
Version 6.1.1
- Fix: Improved API call to Aperture
- Fix: Aperture region field no longer ignored
- Fix: Traps event types updated
- Fix: Improved clustered environment support

Version 6.1.0
- New: Support for Traps 5.0 (Traps Management Service)
- New: Support for Firewall User-ID logs
- New: Credential Detected flag for PAN-OS 8.1
- New: MineMeld indicator retention timer
- New: Batch collection of Aperture logs
- New: Support all Aperture regions
- New: Easier to disable certificate validation for self-hosted MineMeld
- New: Malicious WildFire events tagged for Malware CIM datamodel
- Fix: category field for URL logs is now more consistent
- Fix: url_length field fixed
- Fix: Corrected the double parse of Aperture logs

Potentially breaking changes:
- Traps datamodel has been renamed from pan_endpoint to pan_traps

Version 6.1.1
Feb. 20, 2019

Version 6.1.1
- Fix: Improved API call to Aperture
- Fix: Aperture region field no longer ignored
- Fix: Traps event types updated
- Fix: Improved clustered environment support

Version 6.1.0
- New: Support for Traps 5.0 (Traps Management Service)
- New: Support for Firewall User-ID logs
- New: Credential Detected flag for PAN-OS 8.1
- New: MineMeld indicator retention timer
- New: Batch collection of Aperture logs
- New: Support all Aperture regions
- New: Easier to disable certificate validation for self-hosted MineMeld
- New: Malicious WildFire events tagged for Malware CIM datamodel
- Fix: category field for URL logs is now more consistent
- Fix: url_length field fixed
- Fix: Corrected the double parse of Aperture logs

Potentially breaking changes:
- Traps datamodel has been renamed from pan_endpoint to pan_traps

Version 6.1.0
Oct. 26, 2018
  • New: Support for Traps 5.0 (Traps Management Service)
  • New: Support for Firewall User-ID logs
  • New: Credential Detected flag for PAN-OS 8.1
  • New: MineMeld indicator retention timer
  • New: Batch collection of Aperture logs
  • New: Support all Aperture regions
  • New: Easier to disable certificate validation for self-hosted MineMeld
  • New: Malicious WildFire events tagged for Malware CIM datamodel
  • Fix: category field for URL logs is now more consistent
  • Fix: url_length field fixed
  • Fix: Corrected the double parse of Aperture logs

Potentially breaking changes:
- Traps datamodel has been renamed from pan_endpoint to pan_traps

Version 6.0.2
Dec. 27, 2017

v.6.0.2
* threat_list.csv and app_list.csv updated.

v.6.0.1
* Fixed threat list warning message

v6.0.0
MineMeld Support
AutoFocus Tags Support
Aperture Support
PAN-OS 8.0 new fields
Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 6.0.1
Nov. 21, 2017

v.6.0.1
* Fixed threat list warning message

v6.0.0
MineMeld Support
AutoFocus Tags Support
Aperture Support
PAN-OS 8.0 new fields
Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 6.0.0
Nov. 10, 2017

v6.0.0
* MineMeld Support
* AutoFocus Tags Support
* Aperture Support
* PAN-OS 8.0 new fields
* Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
* Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 3.8.2
Aug. 4, 2017

v3.8.2
* Improved CIM support for correlation log.

v3.8.1
* Configuration screen bug fix

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.1
June 29, 2017

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.0
April 28, 2017

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.7.1
Nov. 7, 2016

v3.7.1
- Changes made to meet new certification requirements

v3.7.0
- Integration with new Splunk Adaptive Response
- Tag to dynamic address group using modular actions and Adaptive Response
- Submit URL’s from any log in Splunk to WildFire
- Logs with malware hashes have a new event action that links directly to that hash in Autofocus
- Improved tagging for Splunk Enterprise Security, based on customer feedback
- New parser for GlobalProtect logs

Important Add-on Upgrade Notes
- Eventtype pan_threat no longer includes these log_subtypes: url, data, file, and wildfire. You might need to update custom searches or panels you created that leverage the pan_threat eventtype. There are new eventtypes for each of the removed log_subtypes: pan_url, pan_data, pan_file, and pan_wildfire.

Version 3.6.1
July 7, 2016
  • Add-on Certified by Splunk
Version 3.6.0
April 22, 2016
  • Support new Traps 3.3.2 log format

WARNING: Traps versions before 3.3.2 are no longer supported beginning with this Add-on version

Version 3.5.2
Feb. 3, 2016
  • Fix issue where endpoint logs would show up in CIM apps, but not Palo Alto Networks app
Version 3.5.1
Nov. 13, 2015
  • Add support for PAN-OS 7.0 new fields
  • Add hip-match log type from Firewall and Panorama
  • Add sourcetype category
  • Add Sanctioned SaaS lookup table
  • Update app_list.csv and threat_list.csv lookup tables with new format and data
  • Fix incorrect value in report_id field for Wildfire logs in PAN-OS 6.1 or higher
  • Fix src_category field should be dest_category
Version 3.5.0
May 28, 2015

Splunk Add-on for Palo Alto Networks 3.5.0. Copyright (C) 2014-2015 Splunk Inc. All rights reserved.

This new Add-on (TA) for Palo Alto Networks supports logs from Palo Alto Networks Next-generation Firewall, Panorama, and Traps Endpoint Security Manager. It is CIM 4.x compliant and designed to work with Splunk Enterprise Security 4 and the Palo Alto Networks App for Splunk v5.0.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.