Requirements:
- This Add-on is intended to be installed on Search Heads along with Splunk Add-on for Palo Alto Networks Add-on for Splunk (https://classic.splunkbase.splunk.com/app/2757) or Splunk Add-on for Palo Alto Networks (https://splunkbase.splunk.com/app/7523)
Installation:
- Splunk Cloud or Splunk Enterprise - Installed on Search Heads
This Add-on is intended to be installed as a companion for the following add-on:
- Install Palo Alto Networks Add-on for Splunk (https://classic.splunkbase.splunk.com/app/2757) or Splunk Add-on for Palo Alto Networks (https://splunkbase.splunk.com/app/7523)
Known issues:
- Disable tag authentication from eventtype "pan_globalprotect"
- Modify Field alias from sourcetype "pan:iot_alert" iot_alert_user to "deviceid AS dvc_id"
- Modify Field user from sourcetype "pan:firewall_cloud"
Requirements:
- This Add-on is intended to be installed on Search Heads along with Splunk Add-on for Palo Alto Networks Add-on for Splunk (https://classic.splunkbase.splunk.com/app/2757) or Splunk Add-on for Palo Alto Networks (https://splunkbase.splunk.com/app/7523)
Installation:
- Splunk Cloud or Splunk Enterprise - Installed on Search Heads
This Add-on is intended to be installed as a companion for the following add-on:
- Install Palo Alto Networks Add-on for Splunk (https://classic.splunkbase.splunk.com/app/2757) or Splunk Add-on for Palo Alto Networks (https://splunkbase.splunk.com/app/7523)
Known issues:
- Disable tag authentication from eventtype "pan_globalprotect"
- Modify Field alias from sourcetype "pan:iot_alert" iot_alert_user to "deviceid AS dvc_id"
- Modify Field user from sourcetype "pan:firewall_cloud"
Requirements:
- This Add-on is intended to be installed on Search Heads along with the Splunk Add-on for Palo Alto Networks Add-on for Splunk (https://classic.splunkbase.splunk.com/app/2757)
Installation:
- Splunk Cloud or Splunk Enterprise - Installed on Search Heads
This Add-on is intended to be installed as a companion for the following add-on:
- Install Palo Alto Networks Add-on for Splunk (https://classic.splunkbase.splunk.com/app/2757) version 7.0.1 or higher
Known issues:
- Disable tag authentication from eventtype "pan_globalprotect"
- Modify Field alias from sourcetype "pan:iot_alert" iot_alert_user to "deviceid AS dvc_id"
Requirements:
- This Add-on is intended to be installed on Search Heads along with Splunk Add-on for Palo Alto Networks Add-on for Splunk (https://classic.splunkbase.splunk.com/app/2757)
Installation:
- Splunk Cloud or Splunk Enterprise - Installed on Search Heads
This Add-on is intended to be installed as a companion for the following add-on:
- Install Palo Alto Networks Add-on for Splunk (https://classic.splunkbase.splunk.com/app/2757) version 7.0.1 or higher
Known issues:
- Disable tag authentication from event type "pan_globalprotect"
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.