Log settings (2024)

The type and frequency of log messages you intend to save determines the type of log storage to use. For example, if you want to log traffic and content logs, you need to configure the unit to log to a syslog server. The FortiProxy system disk is unable to log traffic and content logs because of their frequency and large file size.

Storing log messages to one or more locations, such as a syslog server, might be a better solution for your logging requirements than the FortiProxy system disk.

This topic contains information about logging to FortiAnalyzer or FortiManager units, a syslog server, and to disk.

To configure log settings, go to Log > Log Settings.

Log settings (1)

Configure the following settings:

Memory Enable to store logs in the unit’s memory.
Disk Enable to store logs on the unit’s disk. Enabling disk logging is required to produce data for all FortiView consoles. Logs older than 7 days are deleted from the disk.
Enable Local Reports Enable to create local reports.
Enable Historical FortiView Enabling Historical FortiView is required to product data for all FortiView consoles.
Send Logs to FortiAnalyzer/FortiManager Select to send logs to a FortiAnalyzer or a FortiManager unit.

HTTP transaction logs are also sent to a FortiAnalyzer unit to generate additional details in reports.

IP Address The IP address of the FortiAnalyzer or FortiManager unit.

Select Test Connectivity to test the connectivity with the device.

Upload option Select how often to upload log entries: Real Time, Every Minute, or Every 5 Minutes.
Encrypt log transmission Enable to encrypt logs. Encrypted logs are sent using SSL communication.
Send Logs to Syslog Enable to send logs to a syslog server.
IP Address/FQDN If you enable Send Logs to Syslog, enter the IP address or fully qualified domain name of the syslog server.
Log Settings
Event Logging Select All or select Customize and then select the events to log: System activity event, User activity event, Router activity event, Explicit web proxy event, HA event, Compliance Check Event, and Security audit event.
Local Traffic Log Select All or select Customize and then select the local traffic to log: Log Allowed Traffic, Log Denied Unicast Traffic, Log Local Out Traffic, and Log Denied Broadcast Traffic.
GUI Preferences
Display Logs From Select where logs are displayed from: Memory or Disk.
Resolve Hostnames Enable to resolve host names using reverse DNS lookup.
Resolve Unknown Applications Enable to resolve unknown applications using the Internet Service Database.

Memory debugging

Memory on FortiProxy might appear high, even on an unloaded system; however, this level is not usually cause for concern because available memory is used to improve the disk-caching performance and is returned to the system if needed.

To enable debugging of memory status in cases of high memory usage and to confirm that there is no issue, use the following CLI commands to show memory use by each WAD-worker and cache-service memory usages.

CLI syntax

diagnose wad memory <ssl | ssh>

diagnose wad <worker | csvc> memory stats <basic | misc>

The TAC report generated by execute tac report includes the WAD memory usage statistics.

Local logging and archiving

The FortiProxy system can store log messages on disk. It can store traffic and content logs on the system disk or disks. When the log disk is full, logging to disk can either be suspended, or the oldest logs can be overwritten.

Remote logging to a syslog server

A syslog server is a remote computer running syslog software and is an industry standard for logging. Syslog is used to capture log information provided by network devices. The syslog server is both a convenient and flexible logging device because any computer system, such as Linux, Unix, and Intel-based Windows can run syslog software.

When configuring logging to a syslog server, you need to configure the facility and the log file format, which is either normal or Comma Separated Values (CSV). The CSV format contains commas, whereas the normal format contains spaces. Logs saved in the CSV file format can be viewed in a spreadsheet application, while logs saved in normal format are viewed in a text editor because they are saved as plain text files.

Configuring a facility easily identifies the device that recorded the log file. You can choose from many different facility identifiers, such as daemon or local7.

If you are configuring multiple syslog servers, configuration is available only in the CLI. You can also enable the reliable delivery option for syslog log messages in the CLI.

If you are configuring multiple syslog servers, configuration is available only in the CLI. You can also enable the reliable delivery option for syslog log messages in the CLI.

From the CLI, you can enable reliable delivery of syslog messages using the following commands:

config log {syslogd | syslogd2 | syslogd3 |syslogd4} setting

set status enable

set reliable enable

end

The FortiProxy unit implements the RAW profile of RFC 3195 for reliable delivery of log messages. Reliable syslog protects log information through authentication and data encryption and ensures that the log messages are reliably delivered in the correct order. This feature is disabled by default.

Log settings (2) If more than one syslog server is configured, the syslog servers and their settings appear on the Log Settings page. You can configure multiple syslog servers in the CLI using the config log {syslogd | syslogd2 | syslogd3 | syslogd4} settings CLI command.
Log settings (3) You can specify the source IP address of self-originated traffic when configuring a syslog server; however, this is available only in the CLI.

Open topic with navigation

Log settings (2024)
Top Articles
Motley Fool: Vanguard's best ETFs
20 Tips for Saving Money in Today's Economy
Christian McCaffrey loses fumble to open Super Bowl LVIII
Dr Klabzuba Okc
Songkick Detroit
State Of Illinois Comptroller Salary Database
Otr Cross Reference
The Shoppes At Zion Directory
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Bj Alex Mangabuddy
Roll Out Gutter Extensions Lowe's
How Much Is Tay Ks Bail
Fraction Button On Ti-84 Plus Ce
Jayah And Kimora Phone Number
3476405416
Conan Exiles: Nahrung und Trinken finden und herstellen
Cta Bus Tracker 77
Weepinbell Gen 3 Learnset
Airrack hiring Associate Producer in Los Angeles, CA | LinkedIn
PowerXL Smokeless Grill- Elektrische Grill - Rookloos & geurloos grillplezier - met... | bol
Aps Day Spa Evesham
Football - 2024/2025 Women’s Super League: Preview, schedule and how to watch
Ice Dodo Unblocked 76
Mtr-18W120S150-Ul
Restored Republic June 16 2023
Craiglist.nj
Belledelphine Telegram
Culver's.comsummerofsmiles
Bayard Martensen
Turns As A Jetliner Crossword Clue
Santa Barbara Craigs List
Ice Dodo Unblocked 76
Southtown 101 Menu
Free Tiktok Likes Compara Smm
Blush Bootcamp Olathe
Rocksteady Steakhouse Menu
The Wichita Beacon from Wichita, Kansas
Upstate Ny Craigslist Pets
Pickle Juiced 1234
Ippa 番号
2023 Nickstory
Luvsquad-Links
21 Alive Weather Team
Powerspec G512
Rs3 Nature Spirit Quick Guide
Ehc Workspace Login
Craigslist Mendocino
The Average Amount of Calories in a Poke Bowl | Grubby's Poke
9294027542
Besoldungstabellen | Niedersächsisches Landesamt für Bezüge und Versorgung (NLBV)
Charlotte North Carolina Craigslist Pets
Mast Greenhouse Windsor Mo
Latest Posts
Article information

Author: Stevie Stamm

Last Updated:

Views: 6224

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Stevie Stamm

Birthday: 1996-06-22

Address: Apt. 419 4200 Sipes Estate, East Delmerview, WY 05617

Phone: +342332224300

Job: Future Advertising Analyst

Hobby: Leather crafting, Puzzles, Leather crafting, scrapbook, Urban exploration, Cabaret, Skateboarding

Introduction: My name is Stevie Stamm, I am a colorful, sparkling, splendid, vast, open, hilarious, tender person who loves writing and wants to share my knowledge and understanding with you.