- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi all,
GW: R81.20
SMS: R81.20, will be upgraded to R82
The management server upgrade is planned, and I would like to make sure no log lost during upgrade.
The cluster is configured to send its log to management server.
I know a gateway stores its log temporarily in case of no connection to a associated management server, but I would rather configure the gateway to do so just to make sure.
My rough draft of plan is:
1. configure GWs to store its log on themselves
2. upgrade management server.
3. check SIC status.
4. FTP locally stored logs from gateways to management server /var/log/.
5.chmod and chown log files, giving them same permission and owner.
6. cpstop/start to make sure management server recognize log files.
Do you reckon this is achievable?
not sure just putting logs to /var/log/ is enough or not..
Saitoh
The gateway will store logs locally while the management server is not available, this is something you can rely upon. If you want though you can manually enable it for the duration.
To have locally stored the logs transfer over to the management server, open your gateway properties, expand out Logging, and go to Additional Logging Configuration. At the top of that pane you have Log Forwarding Settings. Enable this to forward logs to your management server at Midnight. This way, at midnight every day, any logs stored on the gateway will be transferred over to the management server and removed off the gateway, saving disk space on the gateway and keeping all your logs in the same place. No need to worry about manually copying files or setting permissions or any of that.
Hi,
This should not be needed to do before mgmt upgrade. Just make sure before upgrade you check the disk space on the firewall itself. If there is enough space in /var/log you should be OK.
On the mgmt check the dir where the logs are located, see how much GB logs are created per day. For example if there are 10 logs files , 2 GB each for 1 day you need 20GB free on the firewall itself if your mgmt will be 24 hours down.
The gateway will store logs locally while the management server is not available, this is something you can rely upon. If you want though you can manually enable it for the duration.
To have locally stored the logs transfer over to the management server, open your gateway properties, expand out Logging, and go to Additional Logging Configuration. At the top of that pane you have Log Forwarding Settings. Enable this to forward logs to your management server at Midnight. This way, at midnight every day, any logs stored on the gateway will be transferred over to the management server and removed off the gateway, saving disk space on the gateway and keeping all your logs in the same place. No need to worry about manually copying files or setting permissions or any of that.
Hi @emmap ,
Thanks for sharing information.
I was not sure local logging is reliable or not, but your comment made me believe I can rely on it.
I think it is not common sight to stop log forwarding to management server. Our customer wants to do so.
E/U often makes a request that does not make sense. 😞
One thing, is locally stored log sent to management server without any manual operation, after the connection is restored?
Locally stored logs are not automatically sent to the management server unless you configured Log Forwarding on the gateway/cluster object how I described in the earlier post, unless this is a newly setup system running R82.10, when it is enabled by default.
Hi @emmap ,
I have learnt it, appreciated!
Now I am really curious about:
Does log forwarding automatically resume right after a management server become available?
How often does the cluster tries resuming log forward to management server while local logging?
If log forwarding goes well when local logging working, does the gateway switch log?
I will investigate the points above in my lab. Thanks again!
There's two things at play here, regular logging to the log targets, and the log forwarding configuration.
Regular logging will resume when the management server becomes available again after the upgrade The gateway will regularly retry this connection. From this point, the gateway will send new logs to the management server.
Log Forwarding occurs at the regular time interval that you configure, the default in R82.10 is at midnight every day. This means that any logs that were stored locally while the gateway was unable to talk to the log server will be transferred over at midnight daily.
Hi,
This should not be needed to do before mgmt upgrade. Just make sure before upgrade you check the disk space on the firewall itself. If there is enough space in /var/log you should be OK.
On the mgmt check the dir where the logs are located, see how much GB logs are created per day. For example if there are 10 logs files , 2 GB each for 1 day you need 20GB free on the firewall itself if your mgmt will be 24 hours down.
Hi @Lesley ,
Appreciated to your comment.
The concrete idea of storage space really helps me a lot. Thank you!
Hey Saitoh,
What Lesley and Emma said is totally logical and actually fact as well.
I have been testing local logging feature, but fw.log will not grow in its size while cpstat fw -f log_connection says the cluster members are saving logs locally due to connectivity problem as follows:
# watch -d -n 10 "cpstat fw -f log_connection"
Every 10.0s: cpstat fw -f log_connection Mon Mar 16 21:21:16 2026
Overall Status: 2
Overall Status Description: Security Gateway is unable to report logs to any
log server
Local Logging Mode Description: Writing logs locally due to connectivity problem
s
Local Logging Mode Status: 2
Local Logging Sending Rate: 0
Log Handling Rate: 0
Log Servers Connections
----------------------------------------------------------
|IP |Status|Status Description |Sending Rate|
----------------------------------------------------------
|10.xxx.x.xxx| 1|Log-Server Disconnected| 0|
----------------------------------------------------------
The target management server has been cpstopped so log server disconnected is an expected output.
I confirmed the value of Local Logging Sending Rate etc. gets updated according to the connection as expected.
However, access control/audit log files in the directory $FWDIR/log/, including rotated logs, seemingly get no updates:
-rw-rw---- 1 admin root 8384 Mar 17 00:00 fw.log
-rw-rw---- 1 admin root 80 Mar 17 00:00 fw.logaccount_ptr
-rw-rw---- 1 admin root 80 Mar 17 00:00 fw.loginitial_ptr
-rw-rw---- 1 admin root 80 Mar 17 00:00 fw.logptr
-rw-rw---- 1 admin root 1526 Mar 17 00:00 fw.logtrack
Some sks tells me that a gateway tries to write logs for every 5 -10 seconds, so I did not expect the modification time of log file to be 00:00.
Is this normal behaviour?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY