Hi Wazuh community,
I’m trying to integrate Fortigate firewall logs into Wazuh (v4.12.0) but I am facing an issue where the logs are not visible in the Wazuh dashboard (Discover).
Environment:Wazuh Manager: 4.12.0 (Ubuntu)
Wazuh Dashboard connected and working
Firewall: Fortigate, sending syslog via UDP/514
From the Wazuh server, I can ping the firewall successfully (ping 10.1.1.2).
Using tcpdump I can confirm syslog packets are arriving on port 514:
→ Packets are captured.
sudo ss -ulnp | grep 514 shows that wazuh-remoted is bound to 10.1.6.67:514.
wazuh-logtest successfully decodes Fortigate log lines when pasted manually.
No Fortigate logs appear in ossec.log or archives.log.
Wazuh Dashboard (Discover) does not show any Fortigate events.
/var/ossec/logs/firewall/firewall.log is empty.
Since packets are arriving and decoders exist, but nothing is written to archives or firewall.log, what could be blocking Wazuh from ingesting the logs?
Is there anything else needed in the <remote> config (e.g. facility, format, or additional tags)?
Could the problem be related to Fortigate syslog format or Wazuh’s handling of local7.info?
Any way to debug why wazuh-remoted is discarding syslog packets?
Thanks in advance for your guidance!
Best Regards!!!
Hi,
Based on your input, you mentioned that you are able to ping the firewall from the Wazuh manager, which confirms proper network connectivity. You are also receiving output when running the tcpdump command.
To further ensure that logs are being ingested by the Wazuh manager from the FortiGate firewall, run the following filtered tcpdump command on the Wazuh manager:
10.1.1.2 - Firewall IP address (the one you see in tcpdump output). Adding /24 allows the whole subnet (256 addresses).
10.1.6.67 - Wazuh manager server IP address.
Ensure that your firewall is configured to forward logs via UDP/514.
You can refer to the Wazuh syslog configuration documentation for more details.
The correct files to use for troubleshooting forwarded logs are:
/var/ossec/logs/archives/archives.log
/var/ossec/logs/archives/archives.json
If firewall logs do not match any default Wazuh decoders/rules, they will still appear in archives.log/archives.json when logging is enabled. From there, you can create custom decoders and rules as needed.
Replace <related string> with a relevant keyword from the expected log.
If logs are visible in archives.log but not in the dashboard, you may need to create custom decoders and rules. Please share sample logs if you’d like further assistance with creating them.
If the problem continues, enable debug logging for the remoted service:
Edit the internal configuration file:
If you still face issues, please share the following for further analysis:
The output of the commands listed above.
The ossec.log file and ossec.conf from your Wazuh manager.
This information will help us assist you more effectively.
Hi Bony,
Thanks for your earlier guidance — it helped a lot. I’ve confirmed that FortiGate logs are now being ingested properly into Wazuh. In the dashboard I can filter and see different data.subtype values such as:
vpn
app-ctrl
forward
local
system
So ingestion looks good, but now I’d like some help with fine-tuning rules and alerts. For example-Raising alerts for VPN login failures or tunnel negotiation failures,Getting visibility into successful VPN logins (currently they appear as informational),Highlighting suspicious or blocked apps from app-ctrl,Monitoring admin logins/config changes from local,Filtering useful system/device events.
Could you please share your ideas or best practices on how to do fine-tuning FortiGate logs in Wazuh?
Thanks again for your support!
Best regards,
Dex