fortinet.fortios.fortios_log_fact – Retrieve log data of fortios log objects.
Note
This plugin is part of the fortinet.fortios collection (version 2.1.3).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install fortinet.fortios
.
To use it in a playbook, specify: fortinet.fortios.fortios_log_fact
.
New in version 2.10: of fortinet.fortios
Requirements
The below requirements are needed on the host that executes this module.
install galaxy collection fortinet.fortios >= 2.1.0.
Parameters
Parameter |
Comments |
---|---|
Token-based authentication. Generated from GUI of Fortigate. |
|
Enable/Disable logging for task. Choices:
|
|
A list of expressions to filter the returned results. The items of the list are combined as LOGICAL AND with operator ampersand. One item itself could be concatenated with a comma as LOGICAL OR. |
|
A list of fields to display for returned results. |
|
the parameter for each selector, see definition in above list. |
|
selector of the retrieved log type Choices:
|
|
A list of expressions to sort the returned results. The items of the list are in ascending order with operator ampersand. One item itself could be in decending order with a comma inside. |
|
Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit. Default: “root” |
Notes
Note
Different selector may have different parameters, users are expected to look up them for a specific selector.
For some selectors, the objects are global, no params are allowed to appear
Not all parameters are required for a slector.
This module is exclusivly for FortiOS Log API.
Examples
- hosts: fortigate03
connection: httpapi
collections:
- fortinet.fortios
vars:
vdom: "root"
ansible_httpapi_use_ssl: yes
ansible_httpapi_validate_certs: no
ansible_httpapi_port: 443
tasks:
- name: get disk event user and memory event user at once.
fortios_log_fact:
enable_log: True
access_token: ""
selectors:
- selector: disk_event_user
filters:
- log_id==41000
- selector: memory_event_user
- name: Get system event log with logid==0100032038
fortios_log_fact:
filters:
- logid==0100032038
selector: "disk_event_system"
params:
rows: 100
- name: Get a description of the quarantined virus file
fortios_log_fact:
selector: "forticloud_virus_archive"
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
Build number of the fortigate image Returned: always Sample: “1547” |
|
Number of rows to return Returned: always Sample: 400 |
|
Serial number of the unit Returned: always Sample: “FGVMEVYYQT3AB5352” |
|
session id for the request Returned: always Sample: 7 |
|
Row number for the first row to return Returned: always Sample: 0 |
|
Indication of the operation’s result Returned: always Sample: “success” |
|
Type of log that can be retrieved Returned: always Sample: “system” |
|
Total lines returned from the result Returned: always Sample: 510 |
|
Virtual domain used Returned: always Sample: “root” |
|
Version of the FortiGate Returned: always Sample: “v5.6.3” |
Authors
Jie Xue (@JieX19)
Link Zheng (@chillancezen)
Hongbin Lu (@fgtdev-hblu)
Frank Shen (@fshen01)