icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Fortinet FortiGate Add-On for Splunk
SHA256 checksum (fortinet-fortigate-add-on-for-splunk_169.tgz) 3d05c09a53b26b2c8ad62e11ac47bee8b3755dd7c7403e44091dfe7a77d16fa7 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_168.tgz) a6c72d8e4cefb3a5273404dd54421fc6445e5409796317279d9652f2ed701152 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_167.tgz) aa3fbc4a7a8dcbe03f12fe227650ec28f9e060444c01022f4501c9ec0fac04c7 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_166.tgz) 74beff6d74a37ea32b704d835ce09fc6c2b899e1bfdef232efa60a2eb90ab637 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_165.tgz) 9f98d7e98b24a4995c6222bb2a6883b426a6f58840d0084b1ef3ca381a9d69af SHA256 checksum (fortinet-fortigate-add-on-for-splunk_164.tgz) e2bd4be98601b7c9e609ed73d9dc22adde806501cfabd26b16785373cdfac034 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_163.tgz) ac24cf4d1646ef92385fc81afc0f8cf7a962b64db9f5167bc05fb558ed2604af SHA256 checksum (fortinet-fortigate-add-on-for-splunk_162.tgz) d0dc8b6319b2545559691ef796a7e91281b8802cd298befb2aa9e7d500f287d4 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_161.tgz) f27cc77e5a6b5e635c27e0b316bda575e59caa7fa7da66e9e9cc5cf80e7f910c SHA256 checksum (fortinet-fortigate-add-on-for-splunk_160.tgz) bf328c2aa37ca66c21e56579a1c327b602e33b16f154803fff4c9ba9f4e56db4 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_16.tgz) 04a2d6119f872f46335a83e345790d92d6d7b0e6c7eec9d391c9135c16bbbcc9 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_15.tgz) 42970182ff7b50542d6555baea6d083acb77e5d08a1ac48e5b2e833f2c3f2a50 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_14.tgz) ce76f0d40f0ac8e446dc45084545a5d8896d7175d3958b6491a914f7c90e5599 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_13.tgz) 95a7403966d0083f62c11e21b18315e6ea50585a07249450db378cbea6f1a73a SHA256 checksum (fortinet-fortigate-add-on-for-splunk_12.tgz) f65e789647db56f5d6384421f046434bd26b8ed6f49731b2a0c9c3a14fa694f9 SHA256 checksum (fortinet-fortigate-add-on-for-splunk_10.tgz) d2397cffed974d6a5ed3cd94e9b98f636cfdbf29a30553560e204dcc2830840c
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Fortinet FortiGate Add-On for Splunk

Splunk Cloud
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
Fortinet FortiGate Add-On for Splunk is the technical add-on (TA) developed by Fortinet, Inc. The add-on enables Splunk Enterprise to ingest or map security and traffic data collected from FortiGate physical and virtual appliances across domains. The key features include:

• Streamlining authentication and access from FortiGate such as administrator login, user login, VPN termination authentication into to Splunk Enterprise Security Access Center

• Mapping FortiGate virus report into Splunk Enterprise Security Endpoint Malware Center

• Ingesting traffic logs, IPS logs, system configuration logs and Web filtering data etc.

Fortinet FortiGate Add-On for Splunk provides common information model (CIM) knowledge, advanced “saved search”, indexers and macros to use with other Splunk Enterprise apps such as Splunk App for Enterprise Security.

The compatible FOS version is 5.0 and later.

Fortinet FortiGate Add-on for Splunk

Next Generation and Datacenter Firewalls

Overview

Fortinet FortiGate Add-On for Splunk is the technical add-on (TA) developed by Fortinet, Inc. The add-on enables Splunk Enterprise to ingest or map security and traffic data collected from FortiGate physical and virtual appliances across domains. The key features include:

• Streamlining authentication and access from FortiGate such as administrator login, user login, VPN termination authentication into to Splunk Enterprise Security Access Center

• Mapping FortiGate virus report into Splunk Enterprise Security Endpoint Malware Center

• Ingesting traffic logs, IPS logs, system configuration logs and Web filtering data etc.

Fortinet FortiGate Add-On for Splunk provides common information model (CIM) knowledge, advanced “saved search”, indexers and macros to use with other Splunk Enterprise apps such as Splunk App for Enterprise Security.

Dependencies

If used with apps that are based on CIM, Splunk Common Information Model Add-on will need to be installed.

Please make sure FortiGate FOS version is 5.0 or later.

Configuration Steps

Install Fortinet FortiGate Add-on for Splunk on search head, indexer, forwarder or single instance Splunk server:

Note: There is a 3rd party add-on for Fortinet named Fortinet Fortigate with FortiOS 5 Add-On with folder name TA-fortinet, which has conflict with Fortinet FortiGate Add-on for Splunk, so you need to disable the 3rd party add-on before you proceed.

There are three ways to install the add-on:

  1. Install from Splunk web UI: Manage Apps->Browse more apps->Search keyword “Fortinet” and find the add-on with Fortinet logo->Click “Install free” button->Click restart splunk service.
  2. Install from file on Splunk web UI: Manage Apps->Install from file->Upload the .tgz file which is downloaded from https://splunkbase.splunk.com/apps ->check the upgrade box-> click restart splunk service.
  3. Install from file on Splunk server CLI interface: Extract the .tgz file->Place the Splunk_TA_fortinet_fortigate folder under $SPLUNK_HOME/etc/apps-> Restart Splunk service.

Add data input on Splunk server:

Note: From version 1.2, the Splunk TA(Add-on) for fortigate no longer match wildcard source or sourcetype to extract fortigate log data, a default sourcetype fortigate_log is specified in default/props.conf instead, please follow the instruction below to configure your input and props.conf for the App and TA(Add-on).

Through Splunk Web UI:
Settings->Data Input->UDP
Port: 514 (Example, can be modified according to your own plan)
leave other parameters as is.

Note: the UDP port, 514 in this example should be opened in firewall for logs to pass through. If you choose TCP input and on FortiGate use "reliable"(tcp) mode for syslog setting, you will need to add the following in local/props.conf because tcp tranported syslog will have xxx <yyy> header as line indicator.(8514 below is an example of TCP port, you can choose your own. There is no timestamp header like UDP so you can specify the timestamp field in the fortigate log, in our case the precision is in nanoseconds so the time format is %s%9N. If your FOS version has time stamp in different precision, refer to: https://docs.splunk.com/Documentation/Splunk/8.1.1/SearchReference/Commontimeformatvariables)

[source::tcp:8514]
SHOULD_LINEMERGE = false
LINE_BREAKER = (\d{2,3}\s+<\d{2,3}>)
TIME_PREFIX = eventtime=
TIME_FORMAT = %s%9N

If you are forwarding FortiGate logs from Fortianalyzer, please make sure you set the format to syslog instead of the default CEF format.

Fortinet FortiGate Add-On for Splunk will by default automatically extract FortiGate log data from inputs with sourcetype 'fortigate_log'.
If you want to configure it to extract a self-defined sourcetype, copy the props.conf
in $SPLUNK_HOME/etc/apps/Splunk_TA_fortinet_fortigate/default/props.conf to
$SPLUNK_HOME/etc/apps/Splunk_TA_fortinet_fortigate/local/props.conf and change the source stanza.

replace [fortigate_log] with [fortigate], for instance.

Restart Splunk service for the change to take effect.

Verify the Add-on in Enterprise Security App

Available dashboards in Enterprise Security App supported by Fortinet Fortigate Add-on for Splunk.

  1. Security Domain->Access->Access Center
  2. Security Domain->Endpoint->Malware Center
  3. Security Domain->Network->Traffic Center
  4. Security Domain->Network->Intrusion Center
  5. Security Domain->Network->Web Center
  6. Security Domain->Network->Network Changes
  7. Security Domain->Network->Port & Protocol Tracker
  8. Security Domain->Identity->Session Center

Please note in FOS 5.6 version, the type field includes "", so in order for the fortigate logs to be recognized, please upgrade this add-on to 1.5 version.

For more information on the App support, email splunk_app@fortinet.com.

Release Notes

Version 1.6.9
Feb. 11, 2025

fix app.manifest permission
add new action lookup for "start"

Version 1.6.8
May 10, 2024

update version to stay active

Version 1.6.7
Nov. 24, 2021

add a pattern for 2601F and future xK models.

Version 1.6.6
Sept. 8, 2021

v1.6.6: Sept 2021
- add alias for legacy source types

Version 1.6.5
Aug. 13, 2021

v1.6.5: Aug 2021
- splunk proposal for better CIM compliance
- map detected in action lookup to allowed

Version 1.6.4
June 3, 2021

fix session throughput miscalculation caused by long session.

Version 1.6.3
April 1, 2021

correct action lookups
update references of fgt to fortigate

Version 1.6.2
Dec. 10, 2019
  • add 2 more action mapping
    - fix deprecated field alias
    - process anomaly as utm log and considered it as attack
Version 1.6.1
Aug. 2, 2019
  1. fix bugs in REGEX to match FortiGate logs.
  2. fix app precheck errors and warnings according to new standard.
Version 1.6.0
Feb. 27, 2018
  1. fix bug for FOS5.6 logs with double quotes
  2. add regex support for FGT6K device ID
  3. fix app inspection issues in version numbering, csv format.
Version 1.6
Feb. 23, 2018
  1. fix bug for FOS5.6 logs with double quotes
  2. add regex support for FGT6K device ID
Version 1.5
July 6, 2017

v1.5: Jul 2017
- Modify regex to accommodate FOS5.6 log format

Version 1.4
Oct. 11, 2016

v1.4: Oct 2016
- Modify regex to accommodate logs from other forwarding sources, which don't have date and time fields

Version 1.3
May 24, 2016

Changes for certification, no bug fixes or features.

Version 1.2
Feb. 26, 2016

v1.2: Feb 2016
- Fix FortiWifi Platform Log problem
- Change for splunk certification
- Remove default sourcetype wildcard matching, use fgt_log sourcetype instead
- Add csv log format support
Note: From version 1.2, the Splunk TA(Add-on) for fortigate no longer match wildcard source or sourcetype to extract fortigate log data, a default sourcetype fgt_log is specified in default/props.conf instead, please follow the instruction in documentation to configure your input and props.conf for the App and TA(Add-on).

Version 1.0
Aug. 19, 2015

v1.0: Aug 2015
- Initial release


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.