Configure a syslog-ng server to send Palo Alto Networks data to your Splunk platform deployment
- Navigate to
/etc/syslog-ng/syslog-ng.conf
and save a copy ofsyslog-ng.conf
as a backup before making any additional configurations. - Navigate to
/etc/syslog-ng/conf.d/
, and create a file calledpan.conf
. - Open
pan.conf
, and paste the following information in order to configure your server to listen on UDP port 514:# syslog-ng config to receive syslog messages from Palo Alto Networks devices options{ create-dirs(yes); }; #Listen on UDP port 514 source s_net{ udp(port("514")); }; #Destinations where syslog-ng should write to destination d_threat { file("/var/log/syslog/pan/$HOST/threat/$YEAR-$MONTH-$DAY-threat.log"); }; destination d_traffic { file("/var/log/syslog/pan/$HOST/traffic/$YEAR-$MONTH-$DAY-traffic.log"); }; destination d_system { file("/var/log/syslog/pan/$HOST/system/$YEAR-$MONTH-$DAY-system.log"); }; destination d_config { file("/var/log/syslog/pan/$HOST/config/$YEAR-$MONTH-$DAY-config.log"); }; destination d_hipmatch { file("/var/log/syslog/pan/$HOST/hipmatch/$YEAR-$MONTH-$DAY-hipmatch.log"); }; destination d_endpoint { file("/var/log/syslog/pan/$HOST/endpoint/$YEAR-$MONTH-$DAY-endpoint.log"); }; destination d_wildfire { file("/var/log/syslog/pan/$HOST/wildfire/$YEAR-$MONTH-$DAY-wildfire.log"); }; destination d_correlation { file("/var/log/syslog/pan/$HOST/correlation/$YEAR-$MONTH-$DAY-correlation.log"); }; destination d_aperture { file("/var/log/syslog/pan/$HOST/aperture/$YEAR-$MONTH-$DAY-aperture.log"); }; #Filters to route sourcetypes to sepearate files filter f_threat { message("THREAT"); }; filter f_traffic { message("TRAFFIC"); }; filter f_system { message("SYSTEM"); }; filter f_config { message("CONFIG"); }; filter f_hipmatch { message("HIPMATCH") }; filter f_endpoint { message("ENDPOINT"); }; filter f_wildfire { message("WILDFIRE"); }; filter f_correlation { message("CORRELATION"); }; filter f_aperture { message("APERTURE"); }; #Log definitions log { source(s_net); destination(d_threat); filter(f_threat); }; log { source(s_net); destination(d_traffic); filter(f_traffic); }; log { source(s_net); destination(d_system); filter(f_system); }; log { source(s_net); destination(d_config); filter(f_config); }; log { source(s_net); destination(d_hipmatch); filter(f_hipmatch); }; log { source(s_net); destination(d_endpoint); filter(f_endpoint); }; log { source(s_net); destination(d_wildfire); filter(f_wildfire); }; log { source(s_net); destination(d_correlation); filter(f_correlation); }; log { source(s_net); destination(d_aperture); filter(f_aperture); };
- Save your changes. To optionally change your port, replace the
source s_net{ udp(port("514"));
with the desired port number. - Restart syslog-ng to apply updates.
sudo service syslog-ng restart
Install a syslog server | Configure system logging on your Palo Alto Networks devices |
This documentation applies to the following versions of Splunk® Enterprise: 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10
Feedback submitted, thanks!