Installing and Configuring Logstash to Ingest Fortinet Syslogs
Вставка
- Опубліковано 7 лют 2025
- #elasticsearch #kibana #logstash #fortigate
In this video, we install and configure Logstash to receive Syslogs from FortiGate, parse them, and send them to Elasticsearch.
Watch how I installed and configured Elasticsearch and Kibana:
• Installing and Configu...
Thank you for watching!
Follow my Twitter: / ayounes9
Follow my Blog: www.thelionpin...
This helped a LOT. Thank you, sir.
Hello Ali - @ 9:18 - how do you know that is the format? can you explain a bit more how you identify such a format?
which one is better depends on performance, send log via filebeat or via logstash?
HI Ali , i have FortiAnalyzer and want to ingest the log to security onion , could i send it directly or should i have syslog vm between FAZ and security onion . what is the best scenario to do this . thanks for your help
Hi Ali, thank you for this video. Right now, we are facing issue to integrate log of Fortigate using Logstash+Elasticsearch+Kibana. We have an issue with the grok from Logstash to create indexing in Elasticsearch.
What is the issue?
كل الشكر و التقدير على هدا العمل الجميل شكرا اخي
Great! Many thanks for this Video
شكرا علي استفدة منك. لعمل log في الشركة شكرا جزيلا. حبذ. لو. تركزلنا على fortigate. و logstash.
Nice one, continue good work
thanks a lot bro. it very useful. Can you explain more about create index for firewall log?
Will work on that, thanks!
Great video
Thank you for the information video, can you suggest if in case i have multiple pods running and i am capturing logs of all application pods on one common persistent storage mounted /var/log what could be possible input string
This is very helpful thank you !!
Glad it was helpful!
logs are not coming to elastic search from syslog server. we done as "enroll in fleet" way? can u pls help me with this issue ?
Nice Vid Ali - very helpful - Question - can Logstash conect securely to Elasticsearch using an API key instead of sending a username and password thru the .conf file? perhaps configuring such API key in the logstash.yml or placing it in the filexyz.conf file used to connect to elasticsearch. Generate the API key in Kibana with logstash-user role and index permissions to publish such logs from logstash into Elasticsearch. Thanks for your previous response to making such video series in Windows servers. - Cheers
how we can get the log from more thaan 1 network device forti ?
Nice Vid Ali
Can you make this Elastic, Kibana, Logstash Videos for Windows Server 2019/2022 or Windows 10?; and perhaps ingest data from an SQL Database server; if at all possible.
Thank You.
wonderfull video
thank u.
it was Grate and useful
High quality content :)
Keep up the good work
+1 sub
Thank you
Can you please do cisco routers and switches integration
Why is that required? I'm new to elastic but I understand from their documents that they have Fortinet integration so I would expect them to be able to parse that without me doing all that stuff manually?
That's right, you can use the Fortinet integration and it does a great job. This is a demo on how to install Logstash, you can also use it to ingest and enrich the Fortinet logs with other data from other sources.
What can I do if I don’t want to define the hosts for fortinet?
because I want to send the logs from multiple fortinet FW
Can I remove hosts line?
Very nice. Thank you. Esselamu Aleykum.
Muy buen trabajo, te felicito 👏
Can you pls help whats the rest of the filter in the fortigate.conf? I cant see the whole code.
mutate{
remove_field => ["@timestamp", "host", "@version",................................
you can use this remove_field => ["@timestamp", "path", "host", "@version", "log", "event"]
@@abdenourguellati3124 thank you so much!
Great video, tnx! But why you use this primitive Putty instead let's say... MobaXTerm or another handy client?
I'm glad you like the video!
Putty works Ok, I will look into MobaXTerm!
Perfect. Thanks!
can you check and work with opnsense as well?
I will look into it!
@@AliYounesGo4IT ok great thanks sir, do you have linkedin'?
I would like to see data from DB being pipelined with logstash and loaded into Elasticsearch 8.2.2
Hi, This is very helpful thank you but It would be much better if you could upload the config file as well.
Hi Ali. Thank´s for the video. At this moment I am getting an error which does not allow me to continue. The port is occupied by java, therefore when starting the logstash it tells me "The address is already being used (bind) port: 5144". (Address already in use - bind)
I think that happened to me once, Logstash was already running, maybe try to stop all Logstash processes and try again (run: ps -aux | grep logstash)
i have the error:
Failed to perform request {:message=>"PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target"
is the issue fixed? I am also getting the same error
Wonderful, thank you sir very informative
Could you demo how to use fortigate agent on ELK?
I will do that soon!
Hi, it is possible to write SNMP input plugin or it is hard work?
I will try that and make a video!
When I run logstash I get this error no configuration found in the configured source
I can think of the path to the .conf file, make sure that it is the full path, example: /etc/logstash/conf.d/example.conf
I resolve this problem how u generate logs with firewall my firewall is empty
@@jamaaberdihna1076 I setup Syslog on the firewall to send to a specific UDP port on Logstash server, and on Logstash I open that port. It should start sending
Hello, thank you for the tutorial, it was fine until I had to start the logstash service, from then on I no longer received the logs, in my case from a Cisco switch, even though I also gave permissions to the certificate and I still do not receive the logs. I runt again the command /usr/share/logstash/bin/logstash -f /etc/logstash/conf.d/cisco.conf -r and there I receive the logs , I don't know what I did wrong, but it doesn't work normally for me
Sorry I had port 514, I watched the video again to listen to your comments and I solved it, thanks
Hi man, thanks for the video it's excellent but can you pls give me more explanation about the command in min 7:30 I didn't get it
Thank you!
The command is starting Logstash from the source binary /usr/share/logstash/bin/logstash and then specifying the configuration file with -f that tells Logstash where to get the data from (input plugin), filters the events (filter plugin) and send to an Elasticsearch output (output plugin)
match => {"message" => "%{SYSLOG5424PRI}%{GREEDY$} is truncated from the video, the window size is hide the rest.
match => {"message" => "%{SYSLOG5424PRI}%{GREEDYDATA:message}" }
@@AliYounesGo4IT Could You please tell me what is in the mutate{ remove_field as it is not shown on video? ( ["@timestamp","host","@version".........
Thanks!
@@Lukaszorr remove_field => ["@timestamp", "path", "host", "@version", "log", "event"]
Hello Ali,
I'm new to ELK and wanted to ask if you've ran into the problem I am encountering or if you can provide guidance.
I am experiencing the issue you encountered at the end of the video where the logstash service stops and stops presenting data on Kibana. I've attempted to restart the logstash services and modify permissions for logstash, but I continue to encounter an issue. I ran a journalctl with logstash.service and notice the error below. Would you be able to provide guidance on this?
[INFO ][logstash.config.source.local.configpathloader] No config files found in path {:path=>"/etc/logstash/conf.d/*"}
[ERROR][logstash.config.sourceloader] No configuration found in the configured sources.
I never encountered this error, but can you double check the pipelines.yml file if it has the path to the conf file, and that there are no syntax errors in the file as well
Hope that helps
@@AliYounesGo4IT Thank you! I was missing the ca path and fingerprint for Logstash. All good now!
hi Roberto i face the same issue could you provide me how to solved it