Description
This article explains how to delete FortiGate log entries stored in memory or local disk.
Scope
FortiOS.
Solution
Memory or local disk logging is enabled on the FortiGate, and other log options are enabled (at Protection Profile level for example). Note that those commands are per-VDOM where applicable:
FGT# execute log filter device 0
FGT# execute log filter category 3
FGT# execute log delete
This will delete webfilter log
Do you want to continue? (y/n) y
FGT# execute log filter device 1
FGT# execute log filter category 3
FGT# execute log delete
This will delete webfilter log
Do you want to continue? (y/n) y
FGT# execute log delete-all
This will delete all local logs
Do you want to continue? (y/n) y
Note:
To get the device and category list, type the filter command without argument.
FGT# execute log filter device
Available devices:
0: memory
1: disk
2: fortianalyzer
3: fortianalyzer-cloud
4: forticloud
Note:
Some options may not be available on other hardware models, and if not configured on the FortiGate.
FGT# execute log filter category
Available categories:
0: traffic
1: event
2: utm-virus
3: utm-webfilter
4: utm-ips
5: utm-emailfilter
7: utm-anomaly
8: utm-voip
9: utm-dlp
10: utm-app-ctrl
12: utm-waf
15: utm-dns
16: utm-ssh
17: utm-ssl
19: utm-file-filter
20: utm-icap
22: utm-sctp-filter
23: forti-switch
Note:
Some categories may not be available on some FortiOS versions and other hardware models.
Related article:
Troubleshooting Tip : Viewing FortiGate log entries from the CLI
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.