Hi
We are trying to integrate AWS Network Firewall logs with FortiSIEM using CloudWatch Logs, as per the FortiSIEM External Systems Configuration Guide. Below are the details of our setup and the challenge we are facing.
AWS Network Firewall is configured successfully
Logs are being sent to CloudWatch Logs
Two types of logs are enabled:
Alert logs
Flow logs
We are using CloudWatch Logs integration (API-based) in FortiSIEM (not S3/SQS)
Example streams visible in CloudWatch:
Alert logs
Flow logs
The stream name changes every hour, while the prefix remains constant.
FortiSIEM uses the backend script:
This script:
Uses DescribeLogStreams for discovery
Supports wildcard (*) in Log Stream Name
Uses GetLogEvents per discovered stream
We tested the script manually from the FortiSIEM supervisor and confirmed:
Log Group is correct
Logs are present in CloudWatch
IAM permissions are correct (logs:DescribeLogStreams, logs:GetLogEvents)
Example:
✔ Works initially
:cross_mark: Fails after one hour when stream rotates
Example:
This matches how the backend script is designed (prefix + wildcard handling).
However, when we configure this in the FortiSIEM UI:
Credential Test gets stuck
No success or failure message
No explicit error in UI
No clear error in logs indicating invalid credentials or API failure
This happens only when * is used at the end of the Log Stream Name.
CloudWatch Logs contain data (verified in AWS console)
Log Group name is correct and exact
IAM permissions are sufficient
The same credentials work when an exact stream name is used
Issue occurs only with wildcard stream configuration
Backend script (aws-phgetflowlogs.php) clearly supports wildcard discovery using:
logStreamNamePrefix
fnmatch() filtering
Is wildcard (*) officially supported in Log Stream Name for CloudWatch-based log sources in FortiSIEM UI?
Is there any UI-side validation or limitation that causes credential test to hang when wildcard is used?
Is there a recommended way to handle hourly rotating Network Firewall log streams in CloudWatch with FortiSIEM?
Are Alert logs and Flow logs expected to be configured as separate log sources, even if they share the same log group?
Is there any known issue or patch related to CloudWatch log stream discovery for AWS Network Firewall?
| User | Count |
|---|---|
| 2876 | |
| 1446 | |
| 843 | |
| 821 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.