icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Fortinet FortiGate Add-On for Splunk
SHA256 checksum (fortinet-fortigate-add-on-for-splunk_167.tgz) a388232a4c2fd0cb2a91adde811f2eddf569ac9508e6ee43e8a7683a51533bee SHA256 checksum (fortinet-fortigate-add-on-for-splunk_166.tgz) 8f7ab6a9d283e4edb80b88ba75244977cbfaae6f81300fa84ed998473a4ed5a1 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_165.tgz) 48b90d9cbc1c72cdf7a84e22779dbfd36bb5917e14b793451145a7472c8665a3 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_164.tgz) aff541409a1a2863499d80339925c64063d2a648337690972a25f6c0b9110b34 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_163.tgz) ff32b0f57f05ad7cedba36885686796ced251f2fb1c50d083dd44d4779d7f6c5 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_162.tgz) 4586c1efe3ccb34cadfe2a7a60984ea1f6ea43c302a8958d781a9daaa0cf1f83 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_161.tgz) e641fa1e5866096cee3b2c4166e1f3360879d0a8b7bf326804c94e476b87ae60 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_160.tgz) 366db4863e7c4af0fdca6f4ded52ca47d0fd484e812c4a264f4f2d405000d100 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_16.tgz) e059f0f41671ddcbe1f457b470bc6d28bb96e0afc98ecf04b4fbe0c81c9297de SHA256 checksum (fortinet-fortigate-add-on-for-splunk_15.tgz) 720263e3fe6d5e8ee91aa13615c0d13ffbee14e48dffabbae946461b8d37c3ea SHA256 checksum (fortinet-fortigate-add-on-for-splunk_14.tgz) b2ddc3682c4bcfffcbddf9eeaadb33fa5f2a12da9337acd1d93e9d53d7fb471a SHA256 checksum (fortinet-fortigate-add-on-for-splunk_13.tgz) 4fc8b7a6d4229229bee7f00b4a7542c10080395ea8d3f5bd908534290a31d3d6 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_12.tgz) 3eca9187bc4d5407d12ca3518584bf2f61f88b0846ea23d4ac2f924a9b356f15 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_10.tgz) d240db6ea4c73663e80eb5fe96c27983a92099391c6353cea36b08c673a4c289
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Fortinet FortiGate Add-On for Splunk

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
Fortinet FortiGate Add-On for Splunk is the technical add-on (TA) developed by Fortinet, Inc. The add-on enables Splunk Enterprise to ingest or map security and traffic data collected from FortiGate physical and virtual appliances across domains. The key features include:

• Streamlining authentication and access from FortiGate such as administrator login, user login, VPN termination authentication into to Splunk Enterprise Security Access Center

• Mapping FortiGate virus report into Splunk Enterprise Security Endpoint Malware Center

• Ingesting traffic logs, IPS logs, system configuration logs and Web filtering data etc.

Fortinet FortiGate Add-On for Splunk provides common information model (CIM) knowledge, advanced “saved search”, indexers and macros to use with other Splunk Enterprise apps such as Splunk App for Enterprise Security.

The compatible FOS version is 5.0 and later.

Fortinet FortiGate Add-on for Splunk

Next Generation and Datacenter Firewalls

Overview

Fortinet FortiGate Add-On for Splunk is the technical add-on (TA) developed by Fortinet, Inc. The add-on enables Splunk Enterprise to ingest or map security and traffic data collected from FortiGate physical and virtual appliances across domains. The key features include:

• Streamlining authentication and access from FortiGate such as administrator login, user login, VPN termination authentication into to Splunk Enterprise Security Access Center

• Mapping FortiGate virus report into Splunk Enterprise Security Endpoint Malware Center

• Ingesting traffic logs, IPS logs, system configuration logs and Web filtering data etc.

Fortinet FortiGate Add-On for Splunk provides common information model (CIM) knowledge, advanced “saved search”, indexers and macros to use with other Splunk Enterprise apps such as Splunk App for Enterprise Security.

Dependencies

If used with apps that are based on CIM, Splunk Common Information Model Add-on will need to be installed.

Please make sure FortiGate FOS version is 5.0 or later.

Configuration Steps

Install Fortinet FortiGate Add-on for Splunk on search head, indexer, forwarder or single instance Splunk server:

Note: There is a 3rd party add-on for Fortinet named Fortinet Fortigate with FortiOS 5 Add-On with folder name TA-fortinet, which has conflict with Fortinet FortiGate Add-on for Splunk, so you need to disable the 3rd party add-on before you proceed.

There are three ways to install the add-on:

  1. Install from Splunk web UI: Manage Apps->Browse more apps->Search keyword “Fortinet” and find the add-on with Fortinet logo->Click “Install free” button->Click restart splunk service.
  2. Install from file on Splunk web UI: Manage Apps->Install from file->Upload the .tgz file which is downloaded from https://splunkbase.splunk.com/apps ->check the upgrade box-> click restart splunk service.
  3. Install from file on Splunk server CLI interface: Extract the .tgz file->Place the Splunk_TA_fortinet_fortigate folder under $SPLUNK_HOME/etc/apps-> Restart Splunk service.

Add data input on Splunk server:

Note: From version 1.2, the Splunk TA(Add-on) for fortigate no longer match wildcard source or sourcetype to extract fortigate log data, a default sourcetype fortigate_log is specified in default/props.conf instead, please follow the instruction below to configure your input and props.conf for the App and TA(Add-on).

Through Splunk Web UI:
Settings->Data Input->UDP
Port: 514 (Example, can be modified according to your own plan)
leave other parameters as is.

Note: the UDP port, 514 in this example should be opened in firewall for logs to pass through. If you choose TCP input and on FortiGate use "reliable"(tcp) mode for syslog setting, you will need to add the following in local/props.conf because tcp tranported syslog will have xxx <yyy> header as line indicator.(8514 below is an example of TCP port, you can choose your own. There is no timestamp header like UDP so you can specify the timestamp field in the fortigate log, in our case the precision is in nanoseconds so the time format is %s%9N. If your FOS version has time stamp in different precision, refer to: https://docs.splunk.com/Documentation/Splunk/8.1.1/SearchReference/Commontimeformatvariables)

[source::tcp:8514]
SHOULD_LINEMERGE = false
LINE_BREAKER = (\d{2,3}\s+<\d{2,3}>)
TIME_PREFIX = eventtime=
TIME_FORMAT = %s%9N

If you are forwarding FortiGate logs from Fortianalyzer, please make sure you set the format to syslog instead of the default CEF format.

Fortinet FortiGate Add-On for Splunk will by default automatically extract FortiGate log data from inputs with sourcetype 'fortigate_log'.
If you want to configure it to extract a self-defined sourcetype, copy the props.conf
in $SPLUNK_HOME/etc/apps/Splunk_TA_fortinet_fortigate/default/props.conf to
$SPLUNK_HOME/etc/apps/Splunk_TA_fortinet_fortigate/local/props.conf and change the source stanza.

replace [fortigate_log] with [fortigate], for instance.

Restart Splunk service for the change to take effect.

Verify the Add-on in Enterprise Security App

Available dashboards in Enterprise Security App supported by Fortinet Fortigate Add-on for Splunk.

  1. Security Domain->Access->Access Center
  2. Security Domain->Endpoint->Malware Center
  3. Security Domain->Network->Traffic Center
  4. Security Domain->Network->Intrusion Center
  5. Security Domain->Network->Web Center
  6. Security Domain->Network->Network Changes
  7. Security Domain->Network->Port & Protocol Tracker
  8. Security Domain->Identity->Session Center

Please note in FOS 5.6 version, the type field includes "", so in order for the fortigate logs to be recognized, please upgrade this add-on to 1.5 version.

For more information on the App support, email splunk_app@fortinet.com.

Release Notes

Version 1.6.7
Nov. 24, 2021

add a pattern for 2601F and future xK models.

Version 1.6.6
Sept. 8, 2021

v1.6.6: Sept 2021
- add alias for legacy source types

Version 1.6.5
Aug. 13, 2021

v1.6.5: Aug 2021
- splunk proposal for better CIM compliance
- map detected in action lookup to allowed

Version 1.6.4
June 3, 2021

fix session throughput miscalculation caused by long session.

Version 1.6.3
April 1, 2021

correct action lookups
update references of fgt to fortigate

Version 1.6.2
Dec. 10, 2019
  • add 2 more action mapping
    - fix deprecated field alias
    - process anomaly as utm log and considered it as attack
Version 1.6.1
Aug. 2, 2019
  1. fix bugs in REGEX to match FortiGate logs.
  2. fix app precheck errors and warnings according to new standard.
Version 1.6.0
Feb. 27, 2018
  1. fix bug for FOS5.6 logs with double quotes
  2. add regex support for FGT6K device ID
  3. fix app inspection issues in version numbering, csv format.
Version 1.6
Feb. 23, 2018
  1. fix bug for FOS5.6 logs with double quotes
  2. add regex support for FGT6K device ID
Version 1.5
July 6, 2017

v1.5: Jul 2017
- Modify regex to accommodate FOS5.6 log format

Version 1.4
Oct. 11, 2016

v1.4: Oct 2016
- Modify regex to accommodate logs from other forwarding sources, which don't have date and time fields

Version 1.3
May 24, 2016

Changes for certification, no bug fixes or features.

Version 1.2
Feb. 26, 2016

v1.2: Feb 2016
- Fix FortiWifi Platform Log problem
- Change for splunk certification
- Remove default sourcetype wildcard matching, use fgt_log sourcetype instead
- Add csv log format support
Note: From version 1.2, the Splunk TA(Add-on) for fortigate no longer match wildcard source or sourcetype to extract fortigate log data, a default sourcetype fgt_log is specified in default/props.conf instead, please follow the instruction in documentation to configure your input and props.conf for the App and TA(Add-on).

Version 1.0
Aug. 19, 2015

v1.0: Aug 2015
- Initial release


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.