Dashboards & Visualizations

Firewall Policy bandwidth usage is higher in Splunk than in Fortigate

shenathsilva
Engager

Hi all, 

I've set up Splunk to receive Fortigate logs according to the guide on https://www.fortinet.com/content/dam/fortinet/assets/alliances/Fortinet-Splunk-Deployment-Guide.pdf 

I've also set up a custom dashboard to make sure I'm receiving events properly.  Eg: this widget is supposed to count data usage on each policy. 

 

 

index="main"  (eventtype=ftnt_fgt_traffic)  |eval sum(bytes) = bytes | eval bytes = bytes/(1024*1024*1024) | rename bytes AS RootObject.bytes policyid AS RootObject.policyid | fields "_time" "host" "source" "sourcetype" "RootObject.bytes" "RootObject.policyid" | stats dedup_splitvals=t sum(RootObject.bytes) AS "Sum of bytes"  by RootObject.policyid | sort limit=0 RootObject.policyid | fields - _span  | rename RootObject.policyid AS "Policy ID"  | fields "Policy ID", "Sum of bytes"

 

 

 image.png

What I've noticed is that the bandwidth it shows on Splunk is higher than what it shows on Fortigate policy. 

Can someone advise me on what I am doing wrong and how to fix this? Let me know if you need any additional information. 

Splunk Enterprise Version:8.1.2 Build:545206cc9f70

Thank you! 

- Shenath 

Labels (2)
0 Karma
1 Solution

shenathsilva
Engager

Answering my own question for anyone else who has this issue with Fortigate FW logs on Splunk, 

This is not caused by duplicate logs but rather by how Fortigate handles long lived sessions. Apparently it sends interim logs which has rcvdbytes and sentbytes fields in the middle of a session. Fortigate calculates the usage properly by excluding these events but when we manually calculate we have to exclude them. 

Easiest solution would be to disable interim logs on Fortigate. 

This is an explanation of what is going on: https://docs.fortinet.com/document/fortianalyzer/6.2.0/new-features/902615/fortiview-long-lived-sess...

This is how to exclude interim logs on the Fortigate: https://kb.fortinet.com/kb/documentLink.do?externalID=FD43912  

View solution in original post

Tags (1)
0 Karma

shenathsilva
Engager

Answering my own question for anyone else who has this issue with Fortigate FW logs on Splunk, 

This is not caused by duplicate logs but rather by how Fortigate handles long lived sessions. Apparently it sends interim logs which has rcvdbytes and sentbytes fields in the middle of a session. Fortigate calculates the usage properly by excluding these events but when we manually calculate we have to exclude them. 

Easiest solution would be to disable interim logs on Fortigate. 

This is an explanation of what is going on: https://docs.fortinet.com/document/fortianalyzer/6.2.0/new-features/902615/fortiview-long-lived-sess...

This is how to exclude interim logs on the Fortigate: https://kb.fortinet.com/kb/documentLink.do?externalID=FD43912  

Tags (1)
0 Karma
Get Updates on the Splunk Community!

.conf25 Registration is OPEN!

Ready. Set. Splunk! Your favorite Splunk user event is back and better than ever. Get ready for more technical ...

Detecting Cross-Channel Fraud with Splunk

This article is the final installment in our three-part series exploring fraud detection techniques using ...

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...