FortiAnalyzer
FortiAnalyzer can receive logs and Windows host events directly from endpoints connected to EMS, and you can use FortiAnalyzer to analyze the logs and run reports.
tnesh
Staff
Staff
Article Id 300170
Description

 

This article describes how to configure the FortiAnalyzer HA instance in the Google Cloud Platform (GCP).

 

Scope

 

FortiAnalyzer-VM for GCP.

 

Important note:

  • Ensure the user has Google Cloud platform accounts, projects, and permissions to the resources.
  • All FortiAnalyzer HA instances must be in the Google Cloud Platform (GCP).
  • All FortiAnalyzer HA instances must be in the same Firmware version.
  • All FortiAnalyzer HA instances must be running in the same Region with the same/different Zone.

 

FortiAnalyer HA instances

Region

faz-a-vm

asia-southeast1-a

faz-b-vm

asia-southeast1-a

faz-c-vm

asia-southeast1-b

 

  • External IP address will be used as Virtual IP address for the HA cluster.
  • FortiAnalyzer v7.4.2 will be used as an example throughout this article.

 

Solution

 

Google Cloud Platform (GCP):

  1. Proceed to deploy all FortiAnalyzer-VM instances by referring to the following document: About FortiAnalyzer for GCP
  2. Make sure all FortiAnalyzer-VM instances have set Cloud API -> Compute Engine access to Read Write
    GPC Portal -> Compute Engine -> VM instances -> Select the VM instance -> Details -> Edit -> Cloud API access -> Compute Engine -> Read Write -> Save.

 

compute-engine-rw.gif

 

Note:

Cloud API access can only be changed when the VM instance is stopped/shutdown.

 

  1. Make sure the GCP VM network subnet used by all FortiAnalyzer-VM instances has enabled Private Google Access
    GPC Portal -> VPC network -> Select the subnet -> Edit -> Turn on Private Google Access -> Save.

 

private-google-access1.gif

 

  1. Make sure the GCP network firewall has allowed all the required policies/ports between all FortiAnalyzer-VM instances. The below firewall policy is required to establish an HA cluster:

 

GCP Firewall Policy

Description

protocol 112

For HA keepalive / VRRP

tcp 514

For initial log sync

tcp 5199

For Configuration sync


GPC Portal -> VPC network -> Select the network -> Firewall -> Edit/Add Firewall rule -> Save/Create.

 

firewall-pol.gif

 

Note:

Ensure the firewall policy target is set correctly. 

 

  1. Next, make sure the Virtual IP is a static IP address under GPC Portal -> VPC network -> IP address -> select the Virtual IP -> select Promote to the static IP address.

 

static-VIP.png

Note:

If External IP is used as Virtual IP like in this example, the network tier must be Premium.

 

FortiAnalyzer:

  1. Download Google Root CA from https://pki.goog/repository/

 

download-g-root-ca.png

 

  1. Import all Google Root CA to all FortiAnalyzer-VM instances under GUI -> System Settings -> Certificates -> Import -> CA Certificates.

 

import-google-root-ca.png

 

  1. Proceed to configure HA settings in the FortiAnalyzer instance.

Primary and Secondary VM:

 

HA-pri-sec.png

 

 

  1. During the HA negotiation and synchronization, Secondary-VM will be disconnected and reconnected back.
  2. Once all the FortiAnalyzer HA instances are up, verify the HA status: FortiAnalyzer GUI -> System Settings -> HA.

     

    ha-status.png

     

Test failover:

  • During HA failover, FortiAnalyzer-VM Virtual IP will be transitioned to the new FortiAnalyzer-Primary.
  • To test failover, kindly run the below CLI command on FortiAnalyzer-primary:

 

     FAZ-A # diag ha failover

 

Related article:

Technical Tip: FortiAnalyzer HA Configuration and Troubleshooting

Contributors