FortiAnalyzer
FortiAnalyzer can receive logs and Windows host events directly from endpoints connected to EMS, and you can use FortiAnalyzer to analyze the logs and run reports.
eribeiro
Staff
Staff
Article Id 414286
Description This article explains how to create two conditions with the Correlation Event Handler on FortiAnalyzer.
Scope FortiAnalyzer 7.6.
Solution

Scenario:


The FortiGate has two ISPs and is configured to trigger an alert when each link remains down for 2 minutes. The FortiGate has the Link Monitor feature set up for both interfaces, WAN1 and WAN2.

 

Solution:

  1. Create the correlation event handler:
    1. Go to Incidents & Events
    2. Create new and type the name
    3. On event handler select the Correlation options
    4. Create the Correlation Sequence like the image below:


1.png

 

    • Rule: isp-down-wan1

2.png

 

    • Rule: isp-up-wan1

 

3.png

 

    • Replicate the rule above for WAN2 by changing the interface under the Generic Text Filter.
    • Set the Correlation Criteria like the image below:


4.png

 

    • Select OK to create the Correlation Event Handler.

 

  1. Check the events under Incidents & Events -> Event Monitor -> All Events:

 

  • Event - WAN2:


5.png

 

  • Logs - WAN2:

 

6.png

 

  • Event - WAN1:

7.png

 

  • Logs - WAN1:

 

8.png

 


Note:

  • If the Correlation Event Handler is created using 'OR' in the middle, the FortiAnalyzer will follow the logic shown in the image below. This logic will be applied:

(isp-down-wan1 NOT_FOLLOWED_BY[2m] (isp-up-wan1 OR isp-down-wan2)) NOT_FOLLOWED_BY[2m] isp-up-wan2

 

9.png

 

  • Instead of:


(isp-down-wan1 NOT_FOLLOWED_BY[2m] isp-up-wan1) OR (isp-down-wan2 NOT_FOLLOWED_BY[2m] isp-up-wan2)

 

10.png

 

 

  • The Correlation Event Handler for this example is attached 2m-LinkMonitor-wan1-wan2.zip.

Related articles:

Creating a custom correlation handler - FortiAnalyzer administration guide

Troubleshooting Tip: How to troubleshoot for an event handler related issue

Contributors