<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fortigate Firewall Syslog distinguish in Reporting</title>
    <link>https://community.splunk.com/t5/Reporting/Fortigate-Firewall-Syslog-distinguish/m-p/688672#M12484</link>
    <description>&lt;P&gt;As &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt; already pointed out, your idea of configuring the input was wrong but let me add my three cents to this.&lt;/P&gt;&lt;P&gt;1) I'm not sure about fortigate logs but generally, if you have RFC-compliant syslogs TAs do extract the host entry from the event itself so the field value assigned by the input is overwritten during ingestion process&lt;/P&gt;&lt;P&gt;2) It's not a very good idea to read syslog events directly on a forwarder. For various reasons - performance, manageability, lack of network-level metadata. It's better to use an intermediate syslog daemon either sending to a HEC input or at least writing to files and reading those files with the forwarder. There are various options here. Most notably SC4S.&lt;/P&gt;&lt;P&gt;EDIT:&lt;/P&gt;&lt;P&gt;3) Oh, and you definitely don't want to set the sourcetype to "firewall_logs". If you're using a TA for Fortigate, use the proper sourcetype for this data as specified in the TA's docs.&lt;/P&gt;</description>
    <pubDate>Sat, 25 May 2024 15:21:30 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2024-05-25T15:21:30Z</dc:date>
    <item>
      <title>Fortigate Firewall Syslog distinguish</title>
      <link>https://community.splunk.com/t5/Reporting/Fortigate-Firewall-Syslog-distinguish/m-p/688629#M12482</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i am forwarding fortigate firewalls syslogs to windows universal forwarder and this data is sent to splunk single search head, but the fortigate logs are appearing by there IP, i want to distinguish them by their hostname. I have created the file inputs.conf in c:/programfiles/splunkforwarder/etc/system/local and&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have put the following stanza into it&amp;nbsp;&lt;/P&gt;&lt;P&gt;[udp://514}&lt;/P&gt;&lt;P&gt;sourcetype=firewall_logs&lt;/P&gt;&lt;P&gt;connection_host= 192.168.1.*, 192.168.1.* (fortigate IP's)&lt;/P&gt;&lt;P&gt;host= Both fortigate hostnames in comma seperated values&lt;/P&gt;&lt;P&gt;but the hostname is appearing under single hostname&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2024 15:54:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Fortigate-Firewall-Syslog-distinguish/m-p/688629#M12482</guid>
      <dc:creator>AtherAD</dc:creator>
      <dc:date>2024-05-24T15:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Fortigate Firewall Syslog distinguish</title>
      <link>https://community.splunk.com/t5/Reporting/Fortigate-Firewall-Syslog-distinguish/m-p/688655#M12483</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/267655"&gt;@AtherAD&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;the connection_host parametes is useful to define the way to associate the host (ip or dns), youcannot use it to assign an host.&lt;/P&gt;&lt;P&gt;In addition,&amp;nbsp;you cannot assign multiple hostnames to an input but only one at a time (eventually using host, not connection_host).&lt;/P&gt;&lt;P&gt;You could try to use the connection_host parameter in your input as described at &lt;A href="https://docs.splunk.com/Documentation/Splunk/9.2.1/Admin/Inputsconf#UDP_.28User_Datagram_Protocol_network_input.29:" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.2.1/Admin/Inputsconf#UDP_.28User_Datagram_Protocol_network_input.29&lt;/A&gt; :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;connection_host = [ip|dns|none]
* "ip" sets the host to the IP address of the system sending the data.
* "dns" sets the host to the reverse DNS entry for IP address of the system
  that sends the data. For this to work correctly, set the forward DNS lookup
  to match the reverse DNS lookup in your DNS configuration.
* "none" leaves the host as specified in inputs.conf, typically the Splunk
  system hostname.
* If the input is configured with a 'sourcetype' that has a transform that
  overrides the 'host' field e.g. 'sourcetype=syslog', that takes
  precedence over the host specified here.
* Default: ip&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;in your case:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[udp://514}
sourcetype = firewall_logs
connection_host = dns
disabled = 0
acceptFrom = 192.168.1.*, 192.168.1.*&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 May 2024 04:33:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Fortigate-Firewall-Syslog-distinguish/m-p/688655#M12483</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-05-25T04:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Fortigate Firewall Syslog distinguish</title>
      <link>https://community.splunk.com/t5/Reporting/Fortigate-Firewall-Syslog-distinguish/m-p/688672#M12484</link>
      <description>&lt;P&gt;As &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt; already pointed out, your idea of configuring the input was wrong but let me add my three cents to this.&lt;/P&gt;&lt;P&gt;1) I'm not sure about fortigate logs but generally, if you have RFC-compliant syslogs TAs do extract the host entry from the event itself so the field value assigned by the input is overwritten during ingestion process&lt;/P&gt;&lt;P&gt;2) It's not a very good idea to read syslog events directly on a forwarder. For various reasons - performance, manageability, lack of network-level metadata. It's better to use an intermediate syslog daemon either sending to a HEC input or at least writing to files and reading those files with the forwarder. There are various options here. Most notably SC4S.&lt;/P&gt;&lt;P&gt;EDIT:&lt;/P&gt;&lt;P&gt;3) Oh, and you definitely don't want to set the sourcetype to "firewall_logs". If you're using a TA for Fortigate, use the proper sourcetype for this data as specified in the TA's docs.&lt;/P&gt;</description>
      <pubDate>Sat, 25 May 2024 15:21:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Fortigate-Firewall-Syslog-distinguish/m-p/688672#M12484</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-05-25T15:21:30Z</dc:date>
    </item>
  </channel>
</rss>

