Description | This article explains how to filter and identify the threat feed (External Connectors) related events from the system event logs based on the log IDs. |
Scope | FortiGate. |
Solution |
Whenever a threat feed is updated successfully or fails to update, it generates certain system event logs. It can be filtered by the Message, Log Description, or Log IDs as follows:
date=2025-04-19 time=05:43:47 eventtime=1745037826712555447 tz="+0100" logid="0100022220" type="event" subtype="system" level="information" vd="root" logdesc="Threat feed updated" status="success" msg="Threat feed 'ext-root.test' updated successfully" desc="threat-feed"
date=2025-04-19 time=05:43:06 eventtime=1745037786334327015 tz="+0100" logid="0100022221" type="event" subtype="system" level="warning" vd="root" logdesc="Threat feed update failed" status="failed" msg="Threat feed 'ext-root.test' update failed" reason="0-Resource not found" desc="threat-feed" |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.