Please I am stuck in the “log normalization” step , logs of firewall Palo alto , I read on the documentation of graylog, to standardize the logs one uses “extractor” . : Copy input, Grok pattern, Json, Regular expression, repleace with regular expression, Split & Index, Substring, Lookup Table …what is the most suitable method with graylog to normalize the logs
For Palo Alto I’d recommend a Grok pattern, but regex and split&index also would work…
There are some content pack options in the Marketplace you might be able to look at too such as https://marketplace.graylog.org/addons/f9facfdf-3d3d-423d-9bd0-4fba9db407ff (search the marketplace for more options), but keep in mind that depending on the version of PAN, some of these might not work. Additinoally, the creator of the content pack may not normalize to the field names you want so that might need adjusting.
Hi @megan201296 thank you for your reply., Grok pattern " Grok" ? please “grok” what does that mean, exactly? in my case how can I configure it according to my equipment Palo alto A 820 ,
but I have not received any logs yet, maybe i keep his default port, and reconfigure the palo alto to send in tcp and the Pan syslog port ??
Please help please
hello everone, please I import content pack Palo Alto Networks Content Pack, i use Graylog 2.5, my firewall palo Alto A820, Pan 8,0.9. this pack it is adequate with graylog 2.5 ??
@macko003 yes i did it I did the normalization of my FW palo alto logs, now, I have the standardized palo alto logs with graylog 2.5…
the logs are not like before, now they are very clear
@macko003 Maybe you’re right but it’s not nice of you, for the work I don’t have only Graylog…and for a beginner like me it’s not bad … in any case thank you