Fortinet white logo
Fortinet white logo

Administration Guide

SIEM log parsers

SIEM log parsers

FortiAnalyzer's SIEM capabilities parse, normalize, and correlate logs from Fortinet products, Apache and Nginx web servers, and the security event logs of Windows and Linux hosts (with Fabric Agent integration). The SIEM logs are displayed in Log View > Logs > All and can be used when generating reports. See Types of logs collected for each device.

Parsing is predefined by FortiAnalyzer and does not require manual configuration by administrators. The predefined SIEM log parsers can be managed in Incidents & Events > Log Parsers. This pane includes predefined log parsers, log parsers from FortiGuard, and any custom log parsers that you have imported.

The Incidents & Events > Log Parsers pane is only available in Fabric ADOMs.

This topic includes information about:

For more information about normalized fabric logs, including the normalized log fields, see the Fabric Normalization Reference on the Fortinet Document Library.

Log Parsers

Go to Incidents & Events > Log Parsers > Log Parsers to view all available log parsers in the table view.

The table view includes the following columns:

Column Description

Name

The name of the SIEM log parser.

Application

The application of the log parser.

Category

The category of the log parser.

Origin

The origin of the log parser.

Predefined log parsers indicate the origin is Built-in. Log parsers delivered in content packages will indicate the origin is FortiGuard. For more information, see Security Automation Service objects.

Status

The status of the log parser: Enabled or Disabled.

Priority

The priority of the log parser. To change the priority of a log parser, click More > Reorder.

Double-click a log parser in the table view to display the Log View for Log Parser pane. This pane displays all related SIEM logs for the log parser in a table view.

Tooltip

You can also view the SIEM logs from Log View > Logs > All. Filter the log view by Data Parser Name = name of the log parser to display the related logs. For example, filter by Data Parser Name = FortiGate Log Parser to display logs related to the FortiGate Log Parser.

You can perform the following actions from Incidents & Events > Log Parsers > Log Parsers:

Action Description

Import

Import a custom log parser. The log parser must be in JSON format.

For more information, see Custom Log Parsers on the Fortinet Document Library.

Export

Export a log parser in the JSON format.

View Logs

Open the Log View for Log Parser pane to display all related SIEM logs in a table view.

Delete

Delete a custom log parser. You cannot delete a predefined log parser.

Enable

Enable a log parser.

Disable

Disable a log parser. You cannot disable a log parser if it is assigned and in use.

Validate

Validate a raw log with the selected log parser. You cannot perform the Validate action with more than one log parser at a time.

Reorder

Change the priority of a log parser. In the Change Parser Priority pane, you can drag and drop the log parsers in the table view to the desired priority.

To import a custom log parser:
  1. In Incidents & Events > Log Parsers > Log Parsers, click Import.

    The Import Log Parser dialog displays.

  2. Drag and drop or select the log parser.

    The log parser must be in the correct format as a JSON file to meet the requirements checked during the import.

  3. Click OK.

To export a log parser:
  1. In Incidents & Events > Log Parsers > Log Parsers, select the checkbox for log parser(s).

  2. Click Export.

    The log parser(s) are exported in JSON format. You can export predefined log parsers to use them as a template for custom log parsers.

To enable or disable a log parser:
  1. In Incidents & Events > Log Parsers > Log Parsers, select the checkbox for log parser(s).

  2. Click Enable or Disable.

    The Enable action is only available when the selected log parsers are disabled.

    The Disable action is only available when the selected log parsers are enabled. The action can only be performed when the log parser is not assigned to any devices.

To validate if the original logs can be parsed:
  1. In Incidents & Events > Log Parsers > Log Parsers, select the checkbox for a log parser.

  2. Click Validate.

    The Validate Log Parser pane opens.

  3. Enter a log to validate and click Validate.

    A Parse Result displays in the Validate Log Parser pane.

Note

Third party logs can be parsed in JSON format.

Assigned Parsers

Go to Incidents & Events > Log Parsers > Assigned Parsers to view the devices/applications and their current log parser assignments in a table view.

To assign a log parser to a device/application:
  1. In Incidents & Events > Log Parsers > Assigned Parsers, click Create New.

    The Assign Parser pane displays.

  2. From the Device ID dropdown, select a device for the log parser assignment.

  3. From the Application dropdown, select an application for the log parser assignment.

  4. From the Current Parser dropdown, select the log parser.

    The log parser must use the selected Application. See Incidents & Events > Log Parsers > Log Parsers to determine which application is used by the log parser.

  5. Click OK.

To edit a log parser assignment:
  1. In Incidents & Events > Log Parsers > Assigned Parsers, click Create New.

    The Change Parser pane displays.

  2. From the Current Parser dropdown, select the log parser.

    The log parser must use the selected Application. See Incidents & Events > Log Parsers > Log Parsers to determine which application is used by the log parser.

  3. Click OK.

SIEM log parsers

SIEM log parsers

FortiAnalyzer's SIEM capabilities parse, normalize, and correlate logs from Fortinet products, Apache and Nginx web servers, and the security event logs of Windows and Linux hosts (with Fabric Agent integration). The SIEM logs are displayed in Log View > Logs > All and can be used when generating reports. See Types of logs collected for each device.

Parsing is predefined by FortiAnalyzer and does not require manual configuration by administrators. The predefined SIEM log parsers can be managed in Incidents & Events > Log Parsers. This pane includes predefined log parsers, log parsers from FortiGuard, and any custom log parsers that you have imported.

The Incidents & Events > Log Parsers pane is only available in Fabric ADOMs.

This topic includes information about:

For more information about normalized fabric logs, including the normalized log fields, see the Fabric Normalization Reference on the Fortinet Document Library.

Log Parsers

Go to Incidents & Events > Log Parsers > Log Parsers to view all available log parsers in the table view.

The table view includes the following columns:

Column Description

Name

The name of the SIEM log parser.

Application

The application of the log parser.

Category

The category of the log parser.

Origin

The origin of the log parser.

Predefined log parsers indicate the origin is Built-in. Log parsers delivered in content packages will indicate the origin is FortiGuard. For more information, see Security Automation Service objects.

Status

The status of the log parser: Enabled or Disabled.

Priority

The priority of the log parser. To change the priority of a log parser, click More > Reorder.

Double-click a log parser in the table view to display the Log View for Log Parser pane. This pane displays all related SIEM logs for the log parser in a table view.

Tooltip

You can also view the SIEM logs from Log View > Logs > All. Filter the log view by Data Parser Name = name of the log parser to display the related logs. For example, filter by Data Parser Name = FortiGate Log Parser to display logs related to the FortiGate Log Parser.

You can perform the following actions from Incidents & Events > Log Parsers > Log Parsers:

Action Description

Import

Import a custom log parser. The log parser must be in JSON format.

For more information, see Custom Log Parsers on the Fortinet Document Library.

Export

Export a log parser in the JSON format.

View Logs

Open the Log View for Log Parser pane to display all related SIEM logs in a table view.

Delete

Delete a custom log parser. You cannot delete a predefined log parser.

Enable

Enable a log parser.

Disable

Disable a log parser. You cannot disable a log parser if it is assigned and in use.

Validate

Validate a raw log with the selected log parser. You cannot perform the Validate action with more than one log parser at a time.

Reorder

Change the priority of a log parser. In the Change Parser Priority pane, you can drag and drop the log parsers in the table view to the desired priority.

To import a custom log parser:
  1. In Incidents & Events > Log Parsers > Log Parsers, click Import.

    The Import Log Parser dialog displays.

  2. Drag and drop or select the log parser.

    The log parser must be in the correct format as a JSON file to meet the requirements checked during the import.

  3. Click OK.

To export a log parser:
  1. In Incidents & Events > Log Parsers > Log Parsers, select the checkbox for log parser(s).

  2. Click Export.

    The log parser(s) are exported in JSON format. You can export predefined log parsers to use them as a template for custom log parsers.

To enable or disable a log parser:
  1. In Incidents & Events > Log Parsers > Log Parsers, select the checkbox for log parser(s).

  2. Click Enable or Disable.

    The Enable action is only available when the selected log parsers are disabled.

    The Disable action is only available when the selected log parsers are enabled. The action can only be performed when the log parser is not assigned to any devices.

To validate if the original logs can be parsed:
  1. In Incidents & Events > Log Parsers > Log Parsers, select the checkbox for a log parser.

  2. Click Validate.

    The Validate Log Parser pane opens.

  3. Enter a log to validate and click Validate.

    A Parse Result displays in the Validate Log Parser pane.

Note

Third party logs can be parsed in JSON format.

Assigned Parsers

Go to Incidents & Events > Log Parsers > Assigned Parsers to view the devices/applications and their current log parser assignments in a table view.

To assign a log parser to a device/application:
  1. In Incidents & Events > Log Parsers > Assigned Parsers, click Create New.

    The Assign Parser pane displays.

  2. From the Device ID dropdown, select a device for the log parser assignment.

  3. From the Application dropdown, select an application for the log parser assignment.

  4. From the Current Parser dropdown, select the log parser.

    The log parser must use the selected Application. See Incidents & Events > Log Parsers > Log Parsers to determine which application is used by the log parser.

  5. Click OK.

To edit a log parser assignment:
  1. In Incidents & Events > Log Parsers > Assigned Parsers, click Create New.

    The Change Parser pane displays.

  2. From the Current Parser dropdown, select the log parser.

    The log parser must use the selected Application. See Incidents & Events > Log Parsers > Log Parsers to determine which application is used by the log parser.

  3. Click OK.