Skip to content

dr4gon123/flasi

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

761 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

FLASI Logo

FLASI — Firewall Log Analytics for Security Insights

The Best Analytics Platform for Firewall Logs

Discord GitHub stars License


🎯 What is FLASI?

Tired of expensive SIEMs that don't understand firewall logs?

FLASI is a full-featured analytics platform that transforms Fortinet (FortiGate, FortiEDR, FortiMail, FortiWeb) and Palo Alto PAN-OS logs into actionable threat intelligence without breaking the bank.

After 10+ years fighting with overpriced SIEMs that treat firewall logs as an leftover checkbox in a datasheet, we built the platform we always needed.

No sampling. No filtering. Full visibility. Full behavioral analysis.

💰 The Problem We Solve

Traditional SIEMs force you to choose:

  • Option A: Log everything → Go bankrupt from licensing costs
  • Option B: Sample/filter logs → Miss threats hiding in the gaps

We chose Option C: Build a platform optimized specifically for high-volume firewall logs using modern, cost-effective tech.

Built by security analysts, for security analysts

✨ Key Features

🔍 Deep Ingestion

  • Full field parsing - Every field from Fortinet and Palo Alto logs, not just the "important" ones
  • ECS standardization - Translates to Elastic Common Schema
  • Rich enrichment - GeoIP, network community ID, registered domains, threat intel integration

📊 Unmatched Analytics

  • Purpose-built dashboards for threat hunting (Kibana & Grafana)
  • Behavioral analysis - Detect slow burns, lateral movement, beaconing
  • No other tool (paid or free) has this depth of firewall log analysis

🛠️ Security Engineer Friendly

  • One-script deployment for Elasticsearch components
  • Pre-configured pipelines for Vector and Elastic Agent
  • Production-ready dashboards on day one
  • No vendor lock-in - swap components as needed

🏗️ Modular Architecture

Fortinet/Palo Alto → Vector/Elastic Agent → Elasticsearch/Victoria Logs → Kibana/Grafana

Mix and match: Every layer is swappable. Use what works for your environment.

📖 Documentation

All detailed documentation has moved to our dedicated documentation site:

🎨 Dashboard Preview

Dashboard

Navigate seamlessly through traffic, UTM, and event dashboards

🌟 Why FLASI?

Feature Traditional SIEM FLASI
Cost $$$$$+ per GB Free + your infrastructure
Firewall Focus Generic checkbox Purpose-built
Full Parsing "Important fields" Every field extracted
Sampling Required for cost Log everything
Dashboards Generic Threat hunting focused
Setup Time Weeks/months Hours

🤝 Community & Support

Get Help

Support the Project

You're already saving thousands on SIEM costs. Consider giving back:

🗺️ Supported Platforms

Data Sources

  • ✅ Fortinet FortiGate
  • ✅ Fortinet FortiEDR
  • ✅ Fortinet FortiMail
  • ✅ Fortinet FortiWeb / FortiAppSec
  • ✅ Palo Alto PAN-OS

Ingestion

  • ✅ Vector (recommended)
  • ⚠️ Elastic Agent (deprecated)
  • ⚠️ Logstash (deprecated)

Storage Backends

  • ✅ Victoria Logs (recommended)
  • ✅ Elasticsearch

Visualization

  • ✅ Grafana (recommended)
  • ✅ Kibana

📜 License

Apache-2.0 license - See LICENSE for details

👥 Authors

  • Logstash pipelines, Elasticsearch config: @hoat23 & @dr4gon123
  • Datasets, Kibana/Grafana dashboards, Vector pipelines, Victoria Logs: @dr4gon123
  • Current maintenance and development: @dr4gon123

About

Fortinet and Palo Alto logs to VictoriaLogs and Elasticsearch

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors