FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Debbie_FTNT
Staff & Editor
Staff & Editor
Article Id 198778
Description

This article describes why some expected memory logs may not be seen in FortiGate/FortiWifi running FortiOS v7.0 and higher.

Scope FortiOS v7.0 and above.
Solution

By default, starting from v7.0, memory logging only shows logs with a warning level or higher. Logs below the warning level are not stored in memory.

 

  1. Make sure that all logs are stored in memory.
  1. To change this and ensure that all logs are stored in memory when they are generated, apply the following configuration via the CLI:

 

config log memory filter

    set severity information

end

 

  1. Once the change has been made, it can be verified via CLI to check that the severity setting has been set to information:

     

 

get log memory filter

severity             : information

forward-traffic      : enable

local-traffic        : disable

multicast-traffic    : enable

sniffer-traffic      : enable

anomaly              : enable

netscan-discovery    : enable

netscan-vulnerability: enable

voip                 : enable

 

  1. If the logs continue not to appear after the severity has been adjusted, consider the following:
  1. Verify that memory logging is enabled.

 

get log memory setting

 

  1. Check if the memory is not full and the log daemon 'miglogd' is running.

 

diagnose system process pidof miglogd

 

  1. Check if the Logs are being displayed using the CLI.

 

execute log filter category 0 <------ 0 is for memory.

      Available devices:
      0: memory
      1: disk
      2: fortianalyzer
      3: fortianalyzer-cloud
      4: forticloud

    

execute log filter view-lines 10

execute log display 

 

  1. Sufficient memory usage: To check system performance, including memory usage, run:

 

get system performance status

 

  1. Use the following command to restart the logging daemon:

 

fnsysctl killall miglogd

 

 In some cases, terminating the daemon has no effect because it is already stopped. Verify its state by running:

 

diagnose sys top 1 100

 

If the miglogd process shows a state value of 'T' (terminated), a system reboot is required to resume logging.