Monitoring Splunk

FortiGate Firewall is consuming the license

ornaldo
Path Finder

Dears,

After the forward of the logs from FortiGate toward SPLUNK we noticed that the license is being consumed recently. Can you help us with trimming and additional advice ?

Thank You

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @ornaldo,

firewall logs are usually the most important license consumer!

Anyway, you can filter your events deleting some events before indexing: in this way you limit the license consuption, but you loose data that could be useful.

So you have to analyze your logs and identify the ones that you think aren't so useful for your purposes, in details, you have to find one or more regexes to filter these events.

Then you have to apply the procedure described at https://docs.splunk.com/Documentation/Splunk/9.0.5/Forwarding/Routeandfilterdatad#Filter_event_data_... on the first Heavy Forwarder you logs pass through or on Indexers (if there isn't ant HF).

in few words,

in props.conf:

[your_sourcetype]
TRANSFORMS-null = setnull

and in transforms.conf:

[setnull]
REGEX = <your_regex_for_filtering>
DEST_KEY = queue
FORMAT = nullQueue

beware choosing the sourcetype that the Fortigate Add-On make a sourcetype transformation, so use the correct one that you can identify running a search on your logs.

Ciao.

Giuseppe

ornaldo
Path Finder

Thank You for your reply.

So using this method it can work without adding another syslog in the middle.

Is there any guide for the REGEX language that should i use for Fortinet ?

Thank You 

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Receiving syslogs directly on your Splunk instance is not a very good idea in a production environment. It has scalability issues and you lose information about where the event really came from (which might be important if you have more than one firewall and - for example - receive logs from many different network segments in which the local firewall is always named "firewall1" so the host field parsed out from the event itself makes the sources indistinguishable from one another.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @ornaldo,

you can find many sites that exèòain hot to use regex, and sites that help you in regex testing, I use regex101.com, but it isn't the only one.

let us know if we can help you more, or, please, accept one answer for the other people of Community.

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated by all the contributors 😉

isoutamo
SplunkTrust
SplunkTrust

Hi

It's just like @gcusello said. One thing what I have seen on Fortinet logs that those have basically same information several times on event. You probably could save some license if you remove those "duplicate" parts on logs. You could use props.conf + SEDCMD for this. BUT f/when you are using Forti's own app & ta to analyse those logs, I don't know are those working after that or not?

r. Ismo

0 Karma

ornaldo
Path Finder

In some articles in the community i have seen that they are suggesting trimming firewall logs using syslog-ng to conserve license Solved: Trimming firewall logs using syslog-ng to conserve... - Splunk Community

I do not know if this is a good idea and i was looking for something less time consuming using props.conf.

But i do not know if anyone had this experience before and can share some information how they have tailored the props.conf 

0 Karma

isoutamo
SplunkTrust
SplunkTrust

This is exactly what I mean. Definitely you should collect those logs with real syslog server instead of using Splunk's TCP listener. Both syslog-ng and rsyslog could do that trimming. Both of those could also send events directly with http(s) to HEC. Other option is use local UF on your syslog servers to collect logs. 

If you have working syslog server you should use it, if not then consider use traditional version vs SC4S (https://github.com/splunk/splunk-connect-for-syslog).

0 Karma

ornaldo
Path Finder

I understand. Thank You 

0 Karma
Get Updates on the Splunk Community!

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...

Splunk App Dev Community Updates – What’s New and What’s Next

Welcome to your go-to roundup of everything happening in the Splunk App Dev Community! Whether you're building ...

The Latest Cisco Integrations With Splunk Platform!

Join us for an exciting tech talk where we’ll explore the latest integrations in Cisco &#43; Splunk! We’ve ...