<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Fortinet FortiGate Add-On for Splunk: How to use only the Fortigate Add-on to parse logs in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Fortinet-FortiGate-Add-On-for-Splunk-How-to-use-only-the/m-p/380125#M46267</link>
    <description>&lt;P&gt;Hello,&lt;BR /&gt;
I have a FortiGate 300e with FortiOS 6.0.4, and would like to index only the security events in Splunk. &lt;BR /&gt;
Also, I want to use only the Fortigate Add-on for the parse of the logs. &lt;BR /&gt;
I do not want to use the Fortigate APP because I will build my own dashboard. Is this possible? &lt;/P&gt;

&lt;P&gt;Does anyone have experience with this?&lt;/P&gt;

&lt;P&gt;Tks&lt;/P&gt;</description>
    <pubDate>Fri, 05 Jul 2019 20:05:56 GMT</pubDate>
    <dc:creator>cesarfabre</dc:creator>
    <dc:date>2019-07-05T20:05:56Z</dc:date>
    <item>
      <title>Fortinet FortiGate Add-On for Splunk: How to use only the Fortigate Add-on to parse logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Fortinet-FortiGate-Add-On-for-Splunk-How-to-use-only-the/m-p/380125#M46267</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;
I have a FortiGate 300e with FortiOS 6.0.4, and would like to index only the security events in Splunk. &lt;BR /&gt;
Also, I want to use only the Fortigate Add-on for the parse of the logs. &lt;BR /&gt;
I do not want to use the Fortigate APP because I will build my own dashboard. Is this possible? &lt;/P&gt;

&lt;P&gt;Does anyone have experience with this?&lt;/P&gt;

&lt;P&gt;Tks&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 20:05:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Fortinet-FortiGate-Add-On-for-Splunk-How-to-use-only-the/m-p/380125#M46267</guid>
      <dc:creator>cesarfabre</dc:creator>
      <dc:date>2019-07-05T20:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Fortinet FortiGate Add-On for Splunk: How to use only the Fortigate Add-on to parse logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Fortinet-FortiGate-Add-On-for-Splunk-How-to-use-only-the/m-p/380126#M46268</link>
      <description>&lt;P&gt;hi ,&lt;/P&gt;

&lt;P&gt;you can deploy related TA to your indexer and heavy forwarder only, you don't need to deploy APP to search head or any splunk role if you don't want their dashboard.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jul 2019 11:25:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Fortinet-FortiGate-Add-On-for-Splunk-How-to-use-only-the/m-p/380126#M46268</guid>
      <dc:creator>burakcinar</dc:creator>
      <dc:date>2019-07-06T11:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: Fortinet FortiGate Add-On for Splunk: How to use only the Fortigate Add-on to parse logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Fortinet-FortiGate-Add-On-for-Splunk-How-to-use-only-the/m-p/380127#M46269</link>
      <description>&lt;P&gt;Hi Burak,&lt;/P&gt;

&lt;P&gt;For the Palo Alto Firewall I was able to do the indexing of the logs via Palo Alto Add-on only. I've used 3 files in the local directory, such as:&lt;/P&gt;

&lt;P&gt;Inputs.conf&lt;BR /&gt;
[udp: // 5514]&lt;BR /&gt;
sourcetype = pan: log&lt;BR /&gt;
no_appending_timestamp = true&lt;BR /&gt;
index = pancompany_logs&lt;/P&gt;

&lt;P&gt;Props.conf&lt;BR /&gt;
[pan: log]&lt;BR /&gt;
TRANSFORMS-drop = discard-traffic&lt;/P&gt;

&lt;P&gt;Transforms.conf&lt;BR /&gt;
[discard-traffic]&lt;BR /&gt;
REGEX =, TRAFFIC,&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;Help!!! &lt;BR /&gt;
How do I configure the inputs, props and transforms in FortiGate Add-on?&lt;/P&gt;

&lt;P&gt;I would like to drop traffic logs (ex.: type="traffic") and index only security logs (ex.: type="utm") from FortiGate.&lt;/P&gt;

&lt;P&gt;Can you help me?&lt;/P&gt;

&lt;P&gt;Tks&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:16:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Fortinet-FortiGate-Add-On-for-Splunk-How-to-use-only-the/m-p/380127#M46269</guid>
      <dc:creator>cesarfabre</dc:creator>
      <dc:date>2020-09-30T01:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: Fortinet FortiGate Add-On for Splunk: How to use only the Fortigate Add-on to parse logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Fortinet-FortiGate-Add-On-for-Splunk-How-to-use-only-the/m-p/380128#M46270</link>
      <description>&lt;P&gt;Did you get this working?  I am working on this myself right now.  Only want the utm logs but on top of this only specific fields within those logs.  &lt;/P&gt;

&lt;P&gt;UTM gets very sizable in our environment and we have a constraining license. &lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2019 15:18:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Fortinet-FortiGate-Add-On-for-Splunk-How-to-use-only-the/m-p/380128#M46270</guid>
      <dc:creator>ldunzweiler</dc:creator>
      <dc:date>2019-10-03T15:18:57Z</dc:date>
    </item>
  </channel>
</rss>

