Skip to main content

What you get (high level)

  • Traffic logs
  • Threat logs
  • System logs (optional)

Data path (how it flows)

PAN-OS → syslog → ingestion/collector → Graylog parsing/routing → storage/indexing → alerts (gl-events*) → CoPilot Alerts/Cases.

Setup (wireframe)

  • Configure PAN-OS to export syslog.
  • Confirm parsing and tenant-aware routing.

Success criteria

  • You can find fresh PAN logs
  • You can identify source device
  • Events are tenant-aware

Starter alerts

  • Threat log severity thresholding (high/critical)
  • Repeated denies/drops from a single source
  • Admin login/config change events

Troubleshooting

  • Confirm syslog profile and server configuration
  • Confirm connectivity and UDP/TCP choice
  • Confirm parsing fields exist