Fortigate Syslog Parsing #2790
-
I'm back in the Security Onion game after a hiatus of around a year or so. Previously my setup included logs sent from a pfSense firewall. These were automatically ingested and parsed into searchable fields wonderfully! Totally hands off. Now, I'm using a Fortigate and shipping its logs to SO. The logs arrive fine, and I can see them indexed as "syslog" category logs, but they're woefully unparsed. I did some research on how to setup my own parsing, but it looks like with this new major version of SO there's a lot less public discussion about how things work. I learned that rather than using logstash, it's using native elasticsearch parsers now...? My google skills may be failing me, but I can't find any documentation on how this works. Do I need to write grok patterns to pull out every single field? Or do I just need to get the logs tagged as "firewall" and some magical things happen behind the curtain? Anybody with Fortinet products out there using security onion as their SIEM? |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 16 replies
-
We have native firewall log parsing for pfsense, but you'll need to have your own parsing configured to be able to parse the incoming syslog, etc. If you can provide some example records, we may be able to assist in getting you pointed in the right direction. |
Beta Was this translation helpful? Give feedback.
-
I sure would like to know how you got them to go into an index. I've been trying for weeks with some sonic wall logs. I've run so-allow for the syslog and I know the logs are coming to the device, but nothing in syslog or an index. Sonicwall logs are similar to yours. They are a key value pair. Here is a sample log. I know the logs need an ingest processor for elastic search. I created one and it is in Elasticsearch. I can see it when I run curl -X GET "localhost:9200/_ingest/pipeline/sonicwall?pretty" But nothing ever runs through it. On the query above it has statistics which show how many times each section was executed. They are all zero. I've posted my sonic wall ingest parser. I know it loads but do not know if it's accurate with the data. Steve |
Beta Was this translation helpful? Give feedback.
-
Did a parser for Fortigate syslog messages ever get created here? |
Beta Was this translation helpful? Give feedback.
-
Native Elastic already has ingest pipelines and support for Fortigate logs. |
Beta Was this translation helpful? Give feedback.
Did a parser for Fortigate syslog messages ever get created here?
We're looking to potentially do the same ourselves either via Zeek capturing those or possibly sending them directly to SO.