Skip to content

Commit

Permalink
Initial commit of version 3.2.1
Browse files Browse the repository at this point in the history
  • Loading branch information
btorresgil committed Jun 27, 2013
0 parents commit 8dd7fd4
Show file tree
Hide file tree
Showing 178 changed files with 17,554 additions and 0 deletions.
19 changes: 19 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
# Borrowed from https://github.com/splunk/splunk-app-splunkgit

# OSX noise
.DS_Store

# Compiled python files
*.pyc

# Eclipse project files
.project
.pydevproject

# Local stuff
local.meta
local/*
!local/inputs.conf.sample

# Git repositories folder
git-repositories/
2 changes: 2 additions & 0 deletions LICENSE
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
This work is licensed under the Creative Commons Attribution 3.0 Unported License.
To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/.
114 changes: 114 additions & 0 deletions README.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,114 @@
# ### ### ### ### ### ### ### ### ### ### ### ### ##
# ##
# Splunk for Palo Alto Networks App ##
# ##
# Description: ##
# Field extractions and sample reports, ##
# and dashboards for the Palo Alto ##
# Networks Firewall ##
# ##
# ##
# ##
# Splunk Version:5.x ##
# App Version: 3.2.1 ##
# Last Modified: May 2013 ##
# Authors: Monzy Merza - Splunk, Inc. ##
# ##
# Many Thanks to Contributors, Advisors, testers##
# Joel 'JayKul' Bennett, David Dorsey ##
# David Hazekamp, Mike Munn, Adam Sealey ##
# David Markquardt, Gerald Kannapathy ##
# Will Hayes, Marc Benoit, Jeff Hillon ##
# Genti Zaimi ##
# ##
# For fastest response to support, setup, help ##
# or feedback, please post to ##
# answers.splunk.com and tag your questions ##
# with 'palo' or paloalto' ##
# ##
# Alternatively, contact: bd-sec@splunk.com ##
# ##
# ##
# ##
# ### ### ### ### ### ### ### ### ### ### ### ### ##

###IMPORTANT###

This app ONLY works on Splunk 5.x

###Dependencies###

The app requires the following Splunk Apps available from Splunk Base http://splunk-base.splunk.com/apps/ :

- Splunk for use with AMMAP Flash maps
- Google Maps
- Geo Location Lookup Script

You do not need to install these apps if you do not wish to use the Apps mapping and geo location features. The main dashboard will not render properly without the above apps.

### Installing ###

Ensure that the apps listed in the Dependencies section are installed. Create an index called, pan_logs if one doesn't already exist. Ensure that the index named pan_logs is in the default search path. You can verify this by going to : Manager -> Access Controls -> Users (or some other user group) -> Indexes searched by default, select the pan_logs index so it appears in the Selected indexes.

To install this app:
- Unpack the tar ball into $SPLUNK_HOME/etc/apps
- Restart Splunk

Note:
- After restart, it can take up to 5 minutes for new data to show up.
- For older data, you can use the backfill feature of splunk to backfill the summary index:

http://www.splunk.com/base/Documentation/latest/Knowledge/Managesummaryindexgapsandoverlaps#Use_the_backfill_script_to_add_other_data_or_fill_summary_index_gaps

### Configuring ###

Setup Screen and Custom Commands:
The first time you run the app from the web ui, you will be presented with a setup screen. The credentials are only needed if you wish to use the panblock and panupdate custom commands. These passwords will be stored in Splunk. The same way as other splunk credentials are stored. If you do not wish to use the custom commands, you can leave this page blank or enter garbage values.

To get the firewall data into Splunk:
IMPORTANT: When you configure the input port, you must set the sourcetype of the firewall data to pan_log and the index to pan_logs.

From the web ui:

Manager -> Data Inputs -> UDP -> New -> UDP port: Palo Alto defaults to UDP. Source type:Set Sourcetype From list: Select Sourcetype: pan_log -> More -> Index: pan_logs

For details, http://www.splunk.com/base/Documentation/latest/admin/MonitorNetworkPorts

Input configuration via inputs.conf:
edit $SPLUNK_HOME/etc/apps/SplunkforPaloAltoNetworks/local/inputs.conf , example below. your udp port may be different. PaloAlto defaults to udp port 514

[udp://514]
index= pan_logs
connection_host = ip
sourcetype = pan_log
no_appending_timestamp = true

- Next, configure the firewall device to direct log traffic to the Splunk server on the network port that you specified.

- Refer to the Palo Alto documentation for details on PAN log forwarding. The Palo Alto devices have a variety of different logs. This app works with the default log configuration. If you use any customized log types that are not defined in the Palo Alto syslog configuration documentation (PANOS-Syslog-Integration-TN-RevM), some of the apps features may not work.

### Source types ###

As Splunk indexes your Palo Alto Networks firewall data, the app will rename the sourcetypes to pan_threat, pan_traffic, pan_config, and pan_system depending on the logging facility.

### High Performance Value Store (HPVS) ###

The app uses the HPVS feature introduced in Splunk 5.0. This feature provides a tremendous performance improvement for dashboards and views. The views and dashboards make use of saved searches that store data on your search head. This means that disk storage on your search head will be consumed as a result of these searches. If you turn off these saved searches, your dashboards will not render. Or dashboard rendering will be really, really slow. Please post a question to answers.splunk.com if you'd like to explore alternatives.

### Lookups ###

Lookups are provided for the threat_id and app field to provide additional information about threats and applications on the network.

###Using the form fields on the dashboards###

All the dashboards work without any filtering values for the form fields. If you want to filter based on a field you should use asterisks before and after the search terms unless you are absolutely sure of the filter value. e.g. In the Content Filtering View, if you want to filter results by the virtual system called 'vsys1', a good practice would be to enter #vsys1# in the Virtual System field.

Keep in mind that searches that have longer time ranges may take a little longer to return the results.

###What's in this version####

- Major improvements on drilldowns in charts

Bug Fixes:
savedsearches.conf: changed hard coded index=pan_logs to `pan_index` in scheduled searches. Thanks to Genti Zaimi for finding the issue and providing the fix
pan_overview_switcher_maps.xml: modified geoip search to include localop to force the search to run on the searchhead. Thanks to Genti Zaimi for identifying the problem and providing the fix
Binary file added appserver/static/13px_buttons.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added appserver/static/Group-2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
1 change: 1 addition & 0 deletions appserver/static/IndexHealthText.html
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
<div>This chart shows you information about the structure of your indexes on disk. Please contact Splunk Support if you suspect you have excessive overlap between buckets. For more information, go to <a href="http://www.splunk.com/base/Deploy:UnderstandingBuckets" target="_blank">Understanding Buckets</a></div>
6 changes: 6 additions & 0 deletions appserver/static/IndexingStatusIntroText1.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
<h2>Welcome to Splunk's indexing status dashboard</h2>
<p>
This dashboard shows a variety of statistics such as index sizes, events indexed, kilobytes indexed by source, index bucket span, and other data that can help Splunk Admins and Splunk Support determine the health of your system.</p>
<p>
Note: You can also see how this dashboard was built by navigating to <i>$SPLUNK_HOME/etc/apps/search/default/data/ui/views/index_status.xml</i> on your Splunk server.
</p>
Binary file added appserver/static/SplunkPoweredOrig.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
19 changes: 19 additions & 0 deletions appserver/static/ammap.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@

<script type="text/javascript" src="/static/app/amMap/ammap/swfobject.js"></script>
<div id="flashcontent">
<strong>If you see this message you most likley need to adjust your HTML file in this view or you are trying to view the HTML directly instead of in a Splunk view module.</strong>
</div>

<script type="text/javascript">
// <![CDATA[
var so = new SWFObject("/static/app/amMap/ammap/ammap.swf", "ammap", "100%", "400", "8", "#FFFFFF");
so.addVariable("path", "/static/app/amMap/ammap/");
so.addVariable("settings_file", escape("/static/app/amMap/ammap/ammap_settings.xml")); // you can set two or more different settings files here (separated by commas)
so.addVariable("data_file", escape("/static/app/amMap/xml_out/home_threat_data.xml"));
so.write("flashcontent");
so.addParam('wmode', 'transparent');
// ]]>
</script>



Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added appserver/static/ammap/ammap.swf
Binary file not shown.
Loading

0 comments on commit 8dd7fd4

Please sign in to comment.