FortiSIEM 6.3.0 AWS Installation Guide
FortiSIEM 6.3.0 AWS Installation Guide
FortiSIEM 6.3.0
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
10/04/2023
FortiSIEM 6.3.0 AWS Installation Guide
TABLE OF CONTENTS
Change Log 4
Fresh Installation 5
Pre-Installation Checklist 5
All-in-one Installation 6
Launch an Instance Using FortiSIEM 6.3.0 AMI 6
Configure FortiSIEM via GUI 10
Upload the FortiSIEM License 14
Choose an Event Database 15
Cluster Installation 15
Install Supervisor 16
Install Workers 17
Register Workers 18
Install Collectors 19
Register Collectors 19
Install Log 23
11/11/2019 Revision 3: small change to installation instructions for FortiSIEM and FortiSIEM Report Server.
08/15/2020 Revision 4: Updated deployment and installation for FortiSIEM 6.1 on AWS.
11/03/2020 Revision 5: Release of AWS Installation and Configuration Guide for 6.1.1.
04/16/2021 Revision 10: Minor update to Run the Backup Script and Shutdown System section.
09/28/2021 Revision 16: Updated volume type information for 6.x guides.
11/17/2021 Revision 18: Updated Register Collectors instructions for 6.x guides.
10/20/2022 Revision 20: Updated Register Collectors instructions for 6.x guides.
This section describes how to install FortiSIEM for the current release.
l Pre-Installation Checklist
l All-in-one Installation
l Cluster Installation
Pre-Installation Checklist
l Storage type
l Online – Local or NFS or Elasticsearch
l Fortinet recommends that you do not choose AWS Spot instances for Supervisor and Worker nodes. Such
instances can go down at any time with short notice, causing instability and performance issues.
l Before beginning FortiSIEM deployment, you must configure external storage
l Determine hardware requirements and choose AWS instance type accordingly:
Note: compared to FortiSIEM 5.x, you need one more disk (OPT) which provides a cache for FortiSIEM.
For OPT - 100GB, the 100GB disk for /opt will consist of a single disk that will split into 2 partitions, /OPT and swap. The
partitions will be created and managed by FortiSIEM when configFSM.sh runs.
Before proceeding to FortiSIEM deployment, you must configure the external storage.
l For NFS deployment, see FortiSIEM - NFS Storage Guide here.
l For Elasticsearch deployment, see FortiSIEM - Elasticsearch Storage Guide here.
All-in-one Installation
This is the simplest installation with a single Virtual Appliance. If storage is external, then you must configure external
storage before proceeding with installation.
l Launch an instance using FortiSIEM 6.3.0 AMI
l Configure FortiSIEM via GUI
l Upload the FortiSIEM License
l Choose an Event Database
1. Navigate to the EC2 AMIs page and find FortiSIEM 6.3.0 AMI (or in AWS Marketplace after the GA release).
2. Launch FortiSIEM-6.3.0.0331.
3. Go to Step 3: Configure Instance Details in AWS Services. Configure instance details such as VPC, Subnet, IP,
etc. Click Next.
4. In Step 4: Add Storage, add additional disks in the Add Storage page. These will be used for the additional
partitions in the virtual appliance. An All In One deployment requires the following additional partitions. Then click
Next.
Note: If you plan to onboard greater than 500 devices, or 5000 eps, please consider increasing IOPS and
Throughput for the disk used to mount /cmdb in FortiSIEM.
For instance, you can run the following command once FortiSIEM is initially deployed to determine which disk
mounts the cmdb folder.
[admin@6 data-definition]$ lsblk | grep cmdb
└─sdc1 8:33 0 60G 0 part /cmdb
In this case /dev/sdc.
You can go into EBS volumes in AWS, and increase the IOPS to 5000, and Throughput to 400MB/s to be more in
line with SSD performance.
Use these partition values:
7. In Step 6: Configure Security Group, add the allowed inbound protocols for your instance. You will need ssh and
https to begin with. Depending on whether this node will receive syslog or other inbound data, you may need to
open additional protocols/ports. Click Review and Launch.
9. Select an existing key pair or create a new key pair, then click Launch Instances.
10. Select the instance that you just created and click Connect.
11. Using the example above in the Connect popup, ssh to the instance you created. Replace root user with ec2-
user. Once logged in, you can execute the sudo su - command to become root user.
5. Select the Country and City for your timezone, and press Next.
Regardless of whether you select Supervisor, Worker, or Collector, you will see the
same series of screens.
7. If you want to enable FIPS, then choose 2 install_with_fips. Otherwise, choose 1 install_without_fips. You have
the option of enabling FIPS (option 3) or disabling FIPS (option 4) later.
8. First you will configure the IPv4 network by entering the following fields, then press Next.
Option Description
9. Test network connectivity by entering a host name that can be resolved by your DNS Server (entered in the
previous step) and can respond to a ping. The host can either be an internal host or a public domain host like
google.com. Press Next.
10. The final configuration confirmation is displayed. Verify that the parameters are correct. If they are not, then press
Back to return to previous dialog boxes to correct any errors. If everything is OK, then press Run.
Option Description
-i IPv4-formatted address
Option Description
11. It will take some time for this process to finish. When it is done, proceed to Upload the FortiSIEM License. If the
VM fails, you can inspect the ansible.log file located at /usr/local/fresh-install/logs to try and
identify the problem.
Before proceeding, make sure that you have obtained valid FortiSIEM license from Forticare.
For more information, see the Licensing Guide.
For a fresh installation, you will be taken to the Event Database Storage page. You will be asked to choose between
Local Disk, NFS or Elasticsearch options. For more details, see Configuring Storage.
After the License has been uploaded, and the Event Database Storage setup is configured, FortiSIEM installation is
complete. If the installation is successful, the VM will reboot automatically. Otherwise, the VM will stop at the failed task.
You can inspect the ansible.log file located at /usr/local/fresh-install/logs if you encounter any issues
during FortiSIEM installation.
After installation completes, ensure that the phMonitor is up and running, for example:
# phstatus
Cluster Installation
For larger installations, you can choose Worker nodes, Collector nodes, and external storage (NFS or Elasticsearch).
l Install Supervisor
l Install Workers
l Register Workers
l Install Collectors
l Register Collectors
Install Supervisor
Elasticsearch
Install Workers
Once the Supervisor is installed, follow the same steps in All-in-one Install to install a Worker except you need to only
choose OS and OPT disks. The recommended CPU and memory settings for Worker node, and required hard disk
settings are:
l CPU = 8
l Memory = 24 GB
l Two hard disks:
l OS – 25GB
l OPT – 100GB
For OPT - 100GB, the 100GB disk for /opt will consist of a single disk that will split into 2 partitions, /OPT and
swap. The partitions will be created and managed by FortiSIEM when configFSM.sh runs.
Register Workers
Once the Worker is up and running, add the Worker to the Supervisor node.
1. Go to ADMIN > License > Nodes.
2. Select Worker from the drop-down list and enter the Worker's IP address. Click Add.
See ADMIN > Health > Cloud Health to ensure that the Workers are up, healthy, and properly added to the
system.
Install Collectors
Once Supervisor and Workers are installed, follow the same steps in All-in-one Install to install a Collector except in Edit
FortiSIEM Hardware Settings, you need to only choose OS and OPT disks. The recommended CPU and memory
settings for Collector node, and required hard disk settings are:
l CPU = 4
l Memory = 8GB
l Two hard disks:
l OS – 25GB
l OPT – 100GB
For OPT - 100GB, the 100GB disk for /opt will consist of a single disk that will split into 2 partitions, /OPT and
swap. The partitions will be created and managed by FortiSIEM when configFSM.sh runs.
Register Collectors
Enterprise Deployments
b. Click OK.
3. Go to ADMIN > Setup > Organizations and click New to add an Organization.
4. Enter the Organization Name, Admin User, Admin Password, and Admin Email.
5. Under Collectors, click New.
6. Enter the Collector Name, Guaranteed EPS, Start Time, and End Time.
The last two values could be set as Unlimited. Guaranteed EPS is the EPS that the Collector will always be able to
send. It could send more if there is excess EPS available.
The password should be enclosed in single quotes to ensure that any non-alphanumeric characters are escaped.
a. Set user and password using the admin user name and password for the Organization that the Collector is
going to be registered to.
b. Set Super IP or Host as the Supervisor's IP address.
c. Set Organization as the name of an organization created on the Supervisor.
d. Set CollectorName from Step 6.
Install Log
Copyright© 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.