: View Traffic and Threat Logs in Strata Logging Service
Focus
Focus

View Traffic and Threat Logs in Strata Logging Service

Table of Contents

View Traffic and Threat Logs in Strata Logging Service

View traffic and threat logs in Strata Logging Service using Cloud NGFW for Azure.
When you integrate Cloud NGFW with Panorama and Strata Logging Service (formerly Cortex Data Lake), you forward logs created by your Cloud NGFW resources and view them in Strata Logging Service. In the Strata Logging Service web interface, you can view the Traffic, threat, and decryption logs generated by your Cloud NGFW Resources.
If you want to view logs in Panorama you must create a log collector.
If you're using Panorama and are not using Strata Logging Service for log collection, you can forward logs to another entity, however, you must enable Strata Logging Service in your logging profile.
For information about the log fields, see the Strata Logging Service Schema Reference: Traffic, Threat, and Decryption.
Important Considerations
For existing customers who have already deployed the Cloud NGFW in Azure and would like to use Strata Logging Service:
  • Upgrade your current Panorama Plugin for Azure to version 5.2.2.
  • Follow the instructions noted in this page.
  • Generate the registration string from the Panorama Plugin for Azure; contact Palo Alto Networks support to update the registration string to enable the Strata Logging Service.
For new users who are deploying the Cloud NGFW resource and would like to use the Strata Logging Service, consider the following:
  • You must use Panorama to enable log forwarding to the Strata Logging Service.
    The Panorama web interface continues to show Cortex Data Lake, rather than the updated product name, Strata Logging Service.
  • You must the Panorama for Azure plugin version 5.2.2-c3 (or later).
  • If your Panorama is setup in a HA pair, both Panorama serial numbers should be registered to the same CSP account, and should also be associated with the same Strata Logging Service.
To use Strata Logging Service with Cloud NGFW for Azure:
  1. Log in to your Strata Logging Service instance.
  2. Select Explore.
  3. From the query drop-down, you can select the type of logs. Each page displays 100 logs. However, you can use the Strata Logging Service Queries to refine the information displayed.
  4. Select Inventory to display information about onboarded firewalls.
  5. In the Inventory page, select Cloud NGFW.

Forward Logs to Strata Logging Service

To forward logs to Strata Logging Service:
  1. In the Panorama console, select Objects under Device Groups.
  2. Select Log Forwarding.
  3. Click Add to create a new log forwarding match list profile.
  4. In the Log Forwarding Profile Match List screen, specify a name for the log.
  5. Select a Log Type from the drop-down.
  6. Select Panorama/Strata Logging Service as the Forward Method.
  7. Click OK.
  8. Commit and push your change.

Forward Logs without Strata Logging Service

If you're using Panorama and are not using Strata Logging Service for log collection, you can forward logs to another entity.
  1. In the Panorama console, select Objects under Device Groups.
  2. Select Log Forwarding.
  3. Click Add to create a new log forwarding match list profile.
  4. In the Log Forwarding Profile Match List screen, specify a name for the log.
  5. Select a Log Type from the drop-down.
  6. Enable Strata Logging Service in your logging profile even if you don't intend to send logs directly to it.
  7. Click OK.
  8. Commit and push your change.