So we installed the Fortinet FortiGate App for Splunk to have a graphical view of the logs received from the different FortiGate devices that are currently reporting to Splunk. We followed the documentation and everything (data input was configured for receiving on UDP port 514 with fgt_log as the sourcetype), and after that the application was working fine. After a couple of days, the panels stopped showing data.
Any ideas for why this is happening?
Thanks in advance!
could you elaborate on which panel you stopped seeing data?
can you search the latest data on search and reporting app by query string: sourcetype=fgt_traffic, or sourcetype=fgt_event, or sourcetype=fgt_utm?
could you elaborate on which panel you stopped seeing data?
can you search the latest data on search and reporting app by query string: sourcetype=fgt_traffic, or sourcetype=fgt_event, or sourcetype=fgt_utm?
Hi jerryzhao
Thanks for the reply. I stopped seeing data in the Threat panel, and also, I noticed that there were some devices missing in the Sessions Transferred Over Time panel.
I searched on the Search and Reporting App, the sourcetypes that you mentioned, and the data for each one of them is there.
What is the progress of datamodel acceleration? There are also certain criteria that need to be met to display the utm event as a threat. Have you tried increasing the time range?
Sessions transferred over time is a real time chart, so the time on fortigate need to be in sync, otherwise, the reported logs won't fall in the watch window. Then, there need to be logs with sourcetype=fgt_traffic for that device.