SIEM log parsers
FortiAnalyzer's SIEM capabilities parse, normalize, and correlate logs from Fortinet products as well as third-party applications. For example, there are built-in log parsers for Apache and Nginx web servers, and the security event logs of Windows and Linux hosts (with Fabric Agent integration). Additionally, more log parsers for other third-party applications can also be added from FortiGuard when FortiAnalyzer has a valid license for the Security Automation Service.
The SIEM logs parsed by these log parsers are displayed in Log View > Logs > All and can be used when generating reports or creating event handlers.
Parsing from the built-in log parsers and FortiGuard log parsers is predefined by FortiAnalyzer and does not require manual configuration by administrators. The predefined SIEM log parsers can be managed in Incidents & Events > Log Parsers. This pane includes predefined log parsers, log parsers from FortiGuard, and any custom log parsers that you have imported.
The Incidents & Events > Log Parsers pane is only available in Fabric ADOMs.
This topic includes information about:
For more information about normalized fabric logs, including the normalized log fields, see the Fabric Normalization Reference on the Fortinet Document Library.
Log Parsers
Go to Incidents & Events > Log Parsers > Log Parsers to view all available log parsers in the table view.
The table view includes the following columns:
| Column | Description |
|---|---|
|
Name |
The name of the SIEM log parser. |
|
Application |
The application of the log parser. |
|
Category |
The category of the log parser. |
|
Origin |
The origin of the log parser. Predefined log parsers indicate the origin is Built-in. Log parsers delivered in content packages will indicate the origin is FortiGuard. For more information, see Finding Security Automation Service objects. |
|
Status |
The status of the log parser: Enabled or Disabled. |
|
Priority |
The priority of the log parser. To change the priority of a log parser, click More > Reorder. |
Double-click a log parser in the table view to display the Log View for Log Parser pane. This pane displays all related SIEM logs for the log parser in a table view.
|
|
You can also view the SIEM logs from Log View > Logs > All. Filter the log view by |
You can perform the following actions from Incidents & Events > Log Parsers > Log Parsers:
| Action | Description |
|---|---|
|
Import |
Import a custom log parser. The log parser must be in JSON format. For more information, see Custom Log Parsers on the Fortinet Document Library. |
|
Export |
Export a log parser in the JSON format. |
|
View Logs |
Open the Log View for Log Parser pane to display all related SIEM logs in a table view. |
|
Delete |
Delete a custom log parser. You cannot delete a predefined log parser. |
|
Enable |
Enable a log parser. |
|
Disable |
Disable a log parser. You cannot disable a log parser if it is assigned and in use. |
|
Validate |
Validate a raw log with the selected log parser. You cannot perform the Validate action with more than one log parser at a time. |
|
Reorder |
Change the priority of a log parser. In the Change Parser Priority pane, you can drag and drop the log parsers in the table view to the desired priority. |
To import a custom log parser:
-
In Incidents & Events > Log Parsers > Log Parsers, click Import.
The Import Log Parser dialog displays.
-
Drag and drop or select the log parser.
The log parser must be in the correct format as a JSON file to meet the requirements checked during the import.
-
Click OK.
To export a log parser:
-
In Incidents & Events > Log Parsers > Log Parsers, select the checkbox for log parser(s).
-
Click Export.
The log parser(s) are exported in JSON format. You can export predefined log parsers to use them as a template for custom log parsers.
To enable or disable a log parser:
-
In Incidents & Events > Log Parsers > Log Parsers, select the checkbox for log parser(s).
-
Click Enable or Disable.
The Enable action is only available when the selected log parsers are disabled.
The Disable action is only available when the selected log parsers are enabled. The action can only be performed when the log parser is not assigned to any devices.
To validate if the original logs can be parsed:
-
In Incidents & Events > Log Parsers > Log Parsers, select the checkbox for a log parser.
-
Click Validate.
The Validate Log Parser pane opens.
-
Enter a log to validate and click Validate.
A Parse Result displays in the Validate Log Parser pane.
|
|
Third party logs can be parsed in JSON format. |
Assigned Parsers
Go to Incidents & Events > Log Parsers > Assigned Parsers to view the devices/applications and their current log parser assignments in a table view.
In some cases, a SYSLOG-XXXXXXXX device is autoamtically created for third-party application log parsers, such as those from FortiGuard. These devices are automatically assigned according to the matched patterns on the raw logs. For example, see Microsoft management activity API connector.
If the raw logs are not matched to any log parser, the Generic SYSLOG parser will be automatically assigned to the device.
To assign a log parser to a device/application:
-
In Incidents & Events > Log Parsers > Assigned Parsers, click Create New.
The Assign Parser pane displays.
-
From the Device ID dropdown, select a device for the log parser assignment.
-
From the Application dropdown, select an application for the log parser assignment.
-
From the Current Parser dropdown, select the log parser.
The log parser must use the selected Application. See Incidents & Events > Log Parsers > Log Parsers to determine which application is used by the log parser.
-
Click OK.
To edit a log parser assignment:
-
In Incidents & Events > Log Parsers > Assigned Parsers, click Create New.
The Change Parser pane displays.
-
From the Current Parser dropdown, select the log parser.
The log parser must use the selected Application. See Incidents & Events > Log Parsers > Log Parsers to determine which application is used by the log parser.
-
Click OK.