Hub
Network

Fortinet FortiGate

FortiGate next-gen firewall logs — traffic forwarding, UTM security modules (web filter, IPS, app control, DNS filter, antivirus), anomaly detection, and system operational events across the full FortiOS log taxonomy.

Quick Start

uv tool install eventum-generator
git clone https://github.com/eventum-generator/content-packs.git
cd content-packs
eventum generate \
  --path generators/network-fortigate/generator.yml \
  --id fortigate \
  --live-mode true

Event Types

Event IDDescriptionFrequencyCategory
traffic-forward-closeTraffic Forward (session close)~46%network
traffic-forward-denyTraffic Forward (deny)~15%network
utm-appctrlApplication Control~6%network
traffic-localTraffic Local (management)~5%network
utm-webfilterFortiGuard Web Filter~5%network
utm-dnsDNS Filter/Logging~5%network
event-systemSystem Admin Events~4%authentication
utm-ipsIPS Signature Detection~4%intrusion_detection
event-vpnVPN Tunnel Events~3%network
event-userUser Authentication~3%authentication
utm-virusAntivirus Detection~1%malware
utm-anomalyDoS/Anomaly Detection~1%intrusion_detection

Realism Features

  • Weighted event distributions matching production FortiGate log volumes (traffic ~70%, UTM ~22%, events ~8%)
  • FortiGate-specific fields — sessionid, vd, policyid, poluuid, trandisp, srccountry/dstcountry, crscore/crlevel
  • Zone-aware routing with FortiGate interface naming (port1=WAN, port2=LAN, port3=DMZ)
  • VPN tunnel correlation via shared state — tunnel-up events paired with tunnel-down events
  • FortiGuard web categories with proper category IDs matching real FortiGuard classification
  • GeoIP country names for external IPs weighted by real-world traffic patterns

Sample Output

{
    "@timestamp": "2026-02-21T14:32:07+00:00",
    "event": {
        "action": "close",
        "category": ["network"],
        "code": "0000000013",
        "dataset": "fortinet_fortigate.log",
        "outcome": "success",
        "type": ["connection", "end", "allowed"]
    },
    "source": { "ip": "10.1.1.11", "port": 60446 },
    "destination": { "ip": "172.217.14.206", "port": 443 },
    "network": { "application": "HTTPS.BROWSER", "direction": "outbound", "transport": "tcp" },
    "observer": {
        "name": "fg-01",
        "product": "Fortigate",
        "serial_number": "FG200F2024000001",
        "vendor": "Fortinet"
    },
    "fortinet": {
        "firewall": { "subtype": "forward", "type": "traffic", "vd": "root" }
    }
}

Parameters

ParameterDefaultDescription
hostnamefg-01FortiGate device hostname
domainexample.comDomain name
serial_numberFG200F2024000001FortiGate serial number
vdomrootVirtual domain name
nat_ip198.51.100.1NAT/public IP
agent_ide4f8c1a2-...Filebeat agent UUID
agent_version8.17.0Filebeat version

Related Generators