Overview
SafeNetworking includes pre-configured Kibana dashboards and visualizations for analyzing threat intelligence, DNS events, IoT threats, and GTP/SCTP mobile carrier logs. These dashboards provide real-time visibility into malicious activities correlated with the Palo Alto Networks Threat Intelligence Cloud.Kibana is part of the ElasticStack and serves as the visualization layer for all logs processed by SafeNetworking.
Accessing Kibana
Default Configuration
Kibana is accessible via web browser on port 5601:Replace
<safenetworking-ip> with the IP address or hostname of your SafeNetworking installation.First Time Setup
On first access, you may need to configure index patterns:Configure Index Patterns
If not already configured, create index patterns for:
threat-*- Threat logs from firewallstraffic-*- Traffic logs (optional)gtp-*- GTP mobile carrier logssctp-*- SCTP signaling logsiot-*- External IoT threat logssystem-*- System logs
Pre-configured Workspaces
SafeNetworking v4.0 includes separate workspaces for different threat categories:DNS Threat Workspace
Visualizations for DNS-based threats, including sinkhole events and malicious domain queries
IoT Threat Workspace
IoT device threats correlated with HoneyPot DB information
GTP/SCTP Workspace
Mobile carrier GTP tunnel and SCTP signaling events with EventCode enrichment
System Logging Workspace
System-level logs and metrics from SafeNetworking infrastructure
Key Dashboards and Visualizations
DNS Threat Dashboard
The DNS Threat dashboard provides comprehensive visibility into DNS-based threats:- Overview
- Filters
- Drill-down
Key Metrics:
- Total DNS threat events
- Unique malicious domains
- Top threat categories
- Geographic distribution of threats
- Timeline of DNS threats by severity
- Top 10 malicious domains
- Threat distribution by category (dns, dns-cloud, dns-security)
- Source IP geographic heatmap
IoT Threat Dashboard
New in v4.0: Full support for non-PAN-OS IoT threat events parsed through Logstash and tagged via HoneyPot DB.
- Top IoT malware families
- Infected device IPs
- Command and control (C2) destinations
- Tag groups and classifications
- Timeline of IoT events
- Identify compromised IoT devices on your network
- Track IoT botnet activity
- Correlate IoT threats with HoneyPot intelligence
GTP/SCTP Dashboard
New in v4.0: Full support for GTP and SCTP logs with EventCode enrichment.
- GTP tunnel events
- SCTP association tracking
- Event code breakdown
- IMSI/IMEI tracking (with customer DB enrichment)
- Geographic distribution of mobile events
System Logging Dashboard
Monitor SafeNetworking infrastructure health: Metrics Tracked:- Logstash event processing rate
- Elasticsearch indexing performance
- Failed event logs
- Storage utilization
- Index shard health
Index Patterns
Available Indices
SafeNetworking uses dated indices for efficient data management:| Index Pattern | Description | Example |
|---|---|---|
threat-* | Threat logs (THREAT type from firewalls) | threat-2026.03 |
traffic-* | Traffic logs (TRAFFIC type, optional) | traffic-2026.03 |
gtp-* | GTP mobile carrier logs | gtp-2026.03 |
sctp-* | SCTP signaling logs | sctp-2026.03 |
iot-* | External IoT threat logs | iot-2026.03 |
system-* | System configuration logs | system-2026.03 |
config-* | Firewall configuration changes | config-2026.03 |
metric-* | Performance metrics | metric-2026.03 |
Indices are created monthly (YYYY.MM format) to facilitate data curation and retention management.
Index Field Mappings
Key fields available for searching and visualization:Common Fields
Common Fields
DNS Threat Fields
DNS Threat Fields
GTP Fields
GTP Fields
IoT Fields
IoT Fields
Creating Custom Dashboards
Step 1: Create a Visualization
Create New Visualization
Click Create visualization and select type:
- Area/Line Chart: Time-series trends
- Data Table: Detailed event listings
- Pie Chart: Distribution breakdowns
- Heat Map: Geographic or correlation maps
- Metric: Single value counters
Configure Metrics and Buckets
- Metrics: What to measure (count, sum, avg)
- Buckets: How to group (date histogram, terms, filters)
Example: Top Malicious Domains
Step 2: Build a Dashboard
Common Queries and Filters
Query Syntax
Kibana uses Kibana Query Language (KQL) or Lucene syntax:- KQL Examples
- Lucene Examples
Saved Searches
Create reusable searches for common queries:Unprocessed DNS Threats
Unprocessed DNS Threats
Query:
tags:SFN-DNS AND SFN.processed:0Purpose: Find DNS threats awaiting AutoFocus enrichmentIndex: threat-*EDL-based Threats
EDL-based Threats
Query:
tags:SFN-EDLPurpose: Show threats detected via External Dynamic ListsIndex: threat-*GTP Events with Errors
GTP Events with Errors
Query:
tags:SFN-GTP AND Severity:criticalPurpose: Critical GTP tunnel eventsIndex: gtp-*IoT Malware by Tag
IoT Malware by Tag
Query:
tags:SFN-IOT AND _exists_:SFN.tag_namePurpose: IoT events with identified malware tagsIndex: iot-*High Severity Outbound Threats
High Severity Outbound Threats
Query:
Severity:(high OR critical) AND SourceZone:trust AND DestinationZone:untrustPurpose: Critical internal hosts reaching malicious destinationsIndex: threat-*Filter by Time Range
Quick time range options:- Last 15 minutes: Real-time monitoring
- Last 1 hour: Recent activity analysis
- Last 24 hours: Daily threat overview
- Last 7 days: Weekly trend analysis
- Last 30 days: Monthly reporting
- Custom: Specify exact date/time range
Advanced Features
Elasticsearch DSL Queries
For complex queries, use Elasticsearch Query DSL directly:Exporting Data
Export dashboard data for external analysis:- CSV Export: From any data table visualization
- Screenshot: Use Kibana’s reporting feature
- API Export: Use Elasticsearch API for bulk exports
Performance Optimization
Index Management
Index Management
SafeNetworking uses monthly indices to balance performance and manageability:Benefits:
- Faster searches on recent data
- Easier data retention (delete old months)
- Reduced shard count
Query Optimization
Query Optimization
Best Practices:
- Use narrow time ranges when possible
- Filter early in the query pipeline
- Use keyword fields for exact matches
- Avoid wildcard prefixes (e.g.,
*domain.com)
Dashboard Performance
Dashboard Performance
Tips for Faster Dashboards:
- Limit visualizations per dashboard (max 10-15)
- Use appropriate time ranges
- Enable dashboard caching
- Use sampler aggregations for large datasets
- Schedule heavy dashboards as reports
Troubleshooting
Dashboard Not Loading
Dashboard Not Loading
Check Elasticsearch Status:Verify Kibana Service:Check Browser Console: Look for JavaScript errors (F12 developer tools)
No Data in Visualizations
No Data in Visualizations
Verify Index Pattern:
- Go to Stack Management > Index Patterns
- Ensure patterns match actual indices
- Refresh field list if needed
Slow Dashboard Performance
Slow Dashboard Performance
Check Shard Health:Monitor Search Performance:Optimize Indices:
Missing Fields in Search
Missing Fields in Search
Refresh Index Pattern Fields:
- Go to Stack Management > Index Patterns
- Select your index pattern
- Click refresh button (circular arrow)
Next Steps
Firewall Configuration
Configure your firewall to send logs to SafeNetworking
Data Model
Learn about Elasticsearch indexes and document schemas
Monitoring
Monitor SafeNetworking system health and metrics
Troubleshooting
Common issues and solutions
