All Apps and Add-ons

Syslog Data is not being parsed correctly by Fortinet Fortigate App

scottrunyon
Contributor

Syslog data from my Fortinet firewall is not being parsed out correctly.   I have noticed that there are multiple formats of messages.   

This first format parses out correctly. 

...  policyid=474 sessionid=3929476361 user="FRED" group="RegularSupport.Grp" srcip=10.120.2.26 ... 

These do not (specifically the user field is not populated)

....   policyid=441 sessionid=3929476369 user="BARNEY" srcip=10.120.36.105   ....

(missing group after user field)

.....   policyid=471 sessionid=3929476336 user="BETTY" group="TL-AVP-SVP.Grp" srcip=10.120.2.128 ....

(has "-" in the text for group)

....   policyid=103 sessionid=3929476142 user="WILMA" group="Wkstns_SSLVPN_PD.Grp" srcip=172.24.1.18    ......

(has "_" in the text for group).

I tried to do a extract fields on one of the different events, that solved the issue for the new event but the original event no longer works.   

I assume that there is a regex somewhere that parses this out but I cannot find it.  My question is where do I go find out where it is so I can hopefully generate one that works?

 

Scott

 

 

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...