-
Notifications
You must be signed in to change notification settings - Fork 50
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
0 parents
commit 8dd7fd4
Showing
178 changed files
with
17,554 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
# Borrowed from https://github.com/splunk/splunk-app-splunkgit | ||
|
||
# OSX noise | ||
.DS_Store | ||
|
||
# Compiled python files | ||
*.pyc | ||
|
||
# Eclipse project files | ||
.project | ||
.pydevproject | ||
|
||
# Local stuff | ||
local.meta | ||
local/* | ||
!local/inputs.conf.sample | ||
|
||
# Git repositories folder | ||
git-repositories/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
This work is licensed under the Creative Commons Attribution 3.0 Unported License. | ||
To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,114 @@ | ||
# ### ### ### ### ### ### ### ### ### ### ### ### ## | ||
# ## | ||
# Splunk for Palo Alto Networks App ## | ||
# ## | ||
# Description: ## | ||
# Field extractions and sample reports, ## | ||
# and dashboards for the Palo Alto ## | ||
# Networks Firewall ## | ||
# ## | ||
# ## | ||
# ## | ||
# Splunk Version:5.x ## | ||
# App Version: 3.2.1 ## | ||
# Last Modified: May 2013 ## | ||
# Authors: Monzy Merza - Splunk, Inc. ## | ||
# ## | ||
# Many Thanks to Contributors, Advisors, testers## | ||
# Joel 'JayKul' Bennett, David Dorsey ## | ||
# David Hazekamp, Mike Munn, Adam Sealey ## | ||
# David Markquardt, Gerald Kannapathy ## | ||
# Will Hayes, Marc Benoit, Jeff Hillon ## | ||
# Genti Zaimi ## | ||
# ## | ||
# For fastest response to support, setup, help ## | ||
# or feedback, please post to ## | ||
# answers.splunk.com and tag your questions ## | ||
# with 'palo' or paloalto' ## | ||
# ## | ||
# Alternatively, contact: bd-sec@splunk.com ## | ||
# ## | ||
# ## | ||
# ## | ||
# ### ### ### ### ### ### ### ### ### ### ### ### ## | ||
|
||
###IMPORTANT### | ||
|
||
This app ONLY works on Splunk 5.x | ||
|
||
###Dependencies### | ||
|
||
The app requires the following Splunk Apps available from Splunk Base http://splunk-base.splunk.com/apps/ : | ||
|
||
- Splunk for use with AMMAP Flash maps | ||
- Google Maps | ||
- Geo Location Lookup Script | ||
|
||
You do not need to install these apps if you do not wish to use the Apps mapping and geo location features. The main dashboard will not render properly without the above apps. | ||
|
||
### Installing ### | ||
|
||
Ensure that the apps listed in the Dependencies section are installed. Create an index called, pan_logs if one doesn't already exist. Ensure that the index named pan_logs is in the default search path. You can verify this by going to : Manager -> Access Controls -> Users (or some other user group) -> Indexes searched by default, select the pan_logs index so it appears in the Selected indexes. | ||
|
||
To install this app: | ||
- Unpack the tar ball into $SPLUNK_HOME/etc/apps | ||
- Restart Splunk | ||
|
||
Note: | ||
- After restart, it can take up to 5 minutes for new data to show up. | ||
- For older data, you can use the backfill feature of splunk to backfill the summary index: | ||
|
||
http://www.splunk.com/base/Documentation/latest/Knowledge/Managesummaryindexgapsandoverlaps#Use_the_backfill_script_to_add_other_data_or_fill_summary_index_gaps | ||
|
||
### Configuring ### | ||
|
||
Setup Screen and Custom Commands: | ||
The first time you run the app from the web ui, you will be presented with a setup screen. The credentials are only needed if you wish to use the panblock and panupdate custom commands. These passwords will be stored in Splunk. The same way as other splunk credentials are stored. If you do not wish to use the custom commands, you can leave this page blank or enter garbage values. | ||
|
||
To get the firewall data into Splunk: | ||
IMPORTANT: When you configure the input port, you must set the sourcetype of the firewall data to pan_log and the index to pan_logs. | ||
|
||
From the web ui: | ||
|
||
Manager -> Data Inputs -> UDP -> New -> UDP port: Palo Alto defaults to UDP. Source type:Set Sourcetype From list: Select Sourcetype: pan_log -> More -> Index: pan_logs | ||
|
||
For details, http://www.splunk.com/base/Documentation/latest/admin/MonitorNetworkPorts | ||
|
||
Input configuration via inputs.conf: | ||
edit $SPLUNK_HOME/etc/apps/SplunkforPaloAltoNetworks/local/inputs.conf , example below. your udp port may be different. PaloAlto defaults to udp port 514 | ||
|
||
[udp://514] | ||
index= pan_logs | ||
connection_host = ip | ||
sourcetype = pan_log | ||
no_appending_timestamp = true | ||
|
||
- Next, configure the firewall device to direct log traffic to the Splunk server on the network port that you specified. | ||
|
||
- Refer to the Palo Alto documentation for details on PAN log forwarding. The Palo Alto devices have a variety of different logs. This app works with the default log configuration. If you use any customized log types that are not defined in the Palo Alto syslog configuration documentation (PANOS-Syslog-Integration-TN-RevM), some of the apps features may not work. | ||
|
||
### Source types ### | ||
|
||
As Splunk indexes your Palo Alto Networks firewall data, the app will rename the sourcetypes to pan_threat, pan_traffic, pan_config, and pan_system depending on the logging facility. | ||
|
||
### High Performance Value Store (HPVS) ### | ||
|
||
The app uses the HPVS feature introduced in Splunk 5.0. This feature provides a tremendous performance improvement for dashboards and views. The views and dashboards make use of saved searches that store data on your search head. This means that disk storage on your search head will be consumed as a result of these searches. If you turn off these saved searches, your dashboards will not render. Or dashboard rendering will be really, really slow. Please post a question to answers.splunk.com if you'd like to explore alternatives. | ||
|
||
### Lookups ### | ||
|
||
Lookups are provided for the threat_id and app field to provide additional information about threats and applications on the network. | ||
|
||
###Using the form fields on the dashboards### | ||
|
||
All the dashboards work without any filtering values for the form fields. If you want to filter based on a field you should use asterisks before and after the search terms unless you are absolutely sure of the filter value. e.g. In the Content Filtering View, if you want to filter results by the virtual system called 'vsys1', a good practice would be to enter #vsys1# in the Virtual System field. | ||
|
||
Keep in mind that searches that have longer time ranges may take a little longer to return the results. | ||
|
||
###What's in this version#### | ||
|
||
- Major improvements on drilldowns in charts | ||
|
||
Bug Fixes: | ||
savedsearches.conf: changed hard coded index=pan_logs to `pan_index` in scheduled searches. Thanks to Genti Zaimi for finding the issue and providing the fix | ||
pan_overview_switcher_maps.xml: modified geoip search to include localop to force the search to run on the searchhead. Thanks to Genti Zaimi for identifying the problem and providing the fix |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
<div>This chart shows you information about the structure of your indexes on disk. Please contact Splunk Support if you suspect you have excessive overlap between buckets. For more information, go to <a href="http://www.splunk.com/base/Deploy:UnderstandingBuckets" target="_blank">Understanding Buckets</a></div> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
<h2>Welcome to Splunk's indexing status dashboard</h2> | ||
<p> | ||
This dashboard shows a variety of statistics such as index sizes, events indexed, kilobytes indexed by source, index bucket span, and other data that can help Splunk Admins and Splunk Support determine the health of your system.</p> | ||
<p> | ||
Note: You can also see how this dashboard was built by navigating to <i>$SPLUNK_HOME/etc/apps/search/default/data/ui/views/index_status.xml</i> on your Splunk server. | ||
</p> |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
|
||
<script type="text/javascript" src="/static/app/amMap/ammap/swfobject.js"></script> | ||
<div id="flashcontent"> | ||
<strong>If you see this message you most likley need to adjust your HTML file in this view or you are trying to view the HTML directly instead of in a Splunk view module.</strong> | ||
</div> | ||
|
||
<script type="text/javascript"> | ||
// <![CDATA[ | ||
var so = new SWFObject("/static/app/amMap/ammap/ammap.swf", "ammap", "100%", "400", "8", "#FFFFFF"); | ||
so.addVariable("path", "/static/app/amMap/ammap/"); | ||
so.addVariable("settings_file", escape("/static/app/amMap/ammap/ammap_settings.xml")); // you can set two or more different settings files here (separated by commas) | ||
so.addVariable("data_file", escape("/static/app/amMap/xml_out/home_threat_data.xml")); | ||
so.write("flashcontent"); | ||
so.addParam('wmode', 'transparent'); | ||
// ]]> | ||
</script> | ||
|
||
|
||
|
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Oops, something went wrong.