FortiAnalyzer
FortiAnalyzer can receive logs and Windows host events directly from endpoints connected to EMS, and you can use FortiAnalyzer to analyze the logs and run reports.
tnesh
Staff & Editor
Staff & Editor
Article Id 300170
Description

 

This article describes how to configure the FortiAnalyzer HA instance in the Google Cloud Platform (GCP).

 

Scope

 

FortiAnalyzer-VM for GCP.

 

Important note:

  • Ensure the user has Google Cloud platform accounts, projects, and permissions to the resources.
  • All FortiAnalyzer HA instances must be in the Google Cloud Platform (GCP).
  • All FortiAnalyzer HA instances must be in the same Firmware version.
  • All FortiAnalyzer HA instances must be running in the same Region with the same/different Zone.

 

FortiAnalyzer HA instances

Region

faz-a-vm

asia-southeast1-a

faz-b-vm

asia-southeast1-a

faz-c-vm

asia-southeast1-b

 

  • The external IP address will be used as the Virtual IP address for the HA cluster.
  • FortiAnalyzer v7.4.2 will be used as an example throughout this article.

 

Solution

 

Google Cloud Platform (GCP):

  1. Proceed to deploy all FortiAnalyzer-VM instances by referring to the following document: About FortiAnalyzer for GCP.
  2. Make sure all FortiAnalyzer-VM instances have set Cloud API -> Compute Engine access to Read Write
    GPC Portal -> Compute Engine -> VM instances -> Select the VM instance -> Details -> Edit -> Cloud API access -> Compute Engine -> Read Write -> Save.

 

compute-engine-rw.gif

 

Note:

Cloud API access can only be changed when the VM instance is stopped/shutdown.

 

  1. Make sure the GCP VM network subnet used by all FortiAnalyzer-VM instances has enabled Private Google Access
    GPC Portal -> VPC network -> Select the subnet -> Edit -> Turn on Private Google Access -> Save.

 

private-google-access1.gif

 

  1. Make sure the GCP network firewall has allowed all the required policies and ports between all FortiAnalyzer-VM instances. The following firewall policy is required to establish an HA cluster:

 

GCP Firewall Policy

Description

protocol 112

For HA keepalive / VRRP

tcp 514

For initial log sync

tcp 5199

For Configuration sync


GPC Portal -> VPC network -> Select the network -> Firewall -> Edit/Add Firewall rule -> Save/Create.

 

firewall-pol.gif

 

Note:

Ensure the firewall policy target is set correctly. 

 

  1. Next, make sure the Virtual IP is a static IP address under GPC Portal -> VPC network -> IP address -> select the Virtual IP -> select Promote to the static IP address.

 

static-VIP.png

 

Note:

If the External IP is used as a Virtual IP, like in this example, the network tier must be Premium.

 

FortiAnalyzer:

  1. Download Google Root CA from https://pki.goog/repository/

 

download-g-root-ca.png

 

  1. Import all Google Root CA to all FortiAnalyzer-VM instances under GUI -> System Settings -> Certificates -> Import -> CA Certificates.

 

import-google-root-ca.png

 

  1. Proceed to configure HA settings in the FortiAnalyzer instance.

Primary and Secondary VM:

 

HA-pri-sec.png

 

 

  1. During the HA negotiation and synchronization, Secondary-VM will be disconnected and reconnected.
  2. Once all the FortiAnalyzer HA instances are up, verify the HA status: FortiAnalyzer GUI -> System Settings -> HA.

     

    ha-status.png

     

Test failover:

  • During HA failover, FortiAnalyzer-VM Virtual IP will be transitioned to the new FortiAnalyzer-Primary.
  • To test failover, run the below CLI command on FortiAnalyzer-primary:

 

FAZ-A # diagnose ha failover

 

Related articles:

Technical Tip: FortiAnalyzer HA Configuration and Troubleshooting

Troubleshooting Tip: FortiAnalyzer HA configurations that will not synchronize