FortiAnalyzer
FortiAnalyzer can receive logs and Windows host events directly from endpoints connected to EMS, and you can use FortiAnalyzer to analyze the logs and run reports.
RuiChang
Staff
Staff
Article Id 276887
Description

 

This article describes the reason for empty report or table for dataset with sessions and method to resolve the issues.

 

Scope

 

FortiAnalyzer.

 

Solution

 

FortiAnalyzer provides multiple default datasets to generate reports for user sessions or bandwidth usage.

 

For example:

 

  1. app-Top-Category-and-Applications-by-Bandwidth.
  2. app-Top-Category-and-Applications-by-Session.
  3. app-Top-Blocked-Applications-by-Session.
  4. app-Top-User-by-Sessions.
  5. App-Sessions-By-Category

Occasionally, users will experience empty data returns for specific tables in the report. If this issue happens, users can navigate to the datasets and look for the SQL Query.

 

In the dataset, the WHERE clause is the major part of most of the report returned as empty. For all the reports with sessions or bandwidth tables, the filter below will be included:

 

WHERE

  $filter

  AND (logflag & 1 > 0)

 

This filter only records forward traffic logs as the output of reports. Hence, users need to check the Log ID of FortiAnalyzer Log View to verify the log received from FortiGates.

 

  1. Navigate to Log View and enable the Log ID column:

 

RuiChang_0-1696124010621.png

 

  1. Examine the Log ID of all the log received from the FortiGate:

 

RuiChang_0-1696124030565.png

 

The example above shows Log ID for output below:

 

0000000013 --> Forward Traffic Log

0001000014 --> Local Traffic Log

 

ID with the initial of 0000xxxxxx indicates forward traffic log while the initial 0001xxxxxx indicates local traffic log.

 

For more information, refer to the document below:

Log ID definitions

 

In order to receive forward traffic log for the FortiAnalyzer report to function, users need to make changes in the firewall policy to log all sessions:

 

RuiChang_0-1696124050343.png

 

After making changes to the firewall policy, wait for a few minutes for the FortiGate to forward the latest log to FortiAnalyzer and users can verify the Log ID in Log View again.

 

Related articles: