All posts

The simplest way to make FortiGate Metabase work like it should

Picture this: you have a pile of firewall logs buried somewhere in FortiGate and a sleek analytics setup humming on Metabase, but connecting them feels like crossing a swamp in dress shoes. You want dashboards that update in real time, rich visibility into policy hits, and zero manual exports. Yet the bridge between these two tools keeps wobbling. FortiGate handles perimeter defense, access control, and traffic inspection like a disciplined guard at the gate. Metabase, on the other hand, tells

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Picture this: you have a pile of firewall logs buried somewhere in FortiGate and a sleek analytics setup humming on Metabase, but connecting them feels like crossing a swamp in dress shoes. You want dashboards that update in real time, rich visibility into policy hits, and zero manual exports. Yet the bridge between these two tools keeps wobbling.

FortiGate handles perimeter defense, access control, and traffic inspection like a disciplined guard at the gate. Metabase, on the other hand, tells stories from data—it turns tables into insight. The moment you connect them properly, you stop chasing CSVs and start watching patterns that actually predict issues before they bite.

The integration workflow looks simple at first: FortiGate logs stream to a database, Metabase queries that database, and analysts build visual reports. But the real unlock comes from treating identity and permissions as first-class citizens. Push FortiGate’s event feed into a secure logging store using an identity-aware proxy. Map your service account in Metabase to read-only roles. Now your analysts see everything they need without nudging ops for credentials.

If dashboards stall or queries return blanks, start by checking timestamp formatting and syslog output consistency. FortiGate likes its fields precise; one stray delimiter and Metabase will shrug. Regular rotation of API keys—monthly, not yearly—keeps compliance folks happy and SOC 2 boxes checked.

When done right, the payoff is striking:

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • Faster diagnosis of weird traffic spikes before end users complain.
  • Unified reporting that merges threat data with performance metrics.
  • Reduced manual toil because logs flow directly into models you trust.
  • Stronger audit trails for IAM and OIDC enforcement across teams.
  • Real confidence in security posture, not blind faith in alerts.

Developers love this setup because it saves time and clicks. The wait for network data dissolves into background automation. Query latency drops, dashboards refresh faster, and onboarding new users feels like flipping a switch, not filing a ticket. Fewer handoffs, fewer Slack messages, more velocity.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. Instead of writing another custom connector, you define who can see FortiGate data and hoop.dev ensures Metabase only talks to the right identity, no matter where the user sits—on VPN, cloud, or home Wi-Fi.

How do I connect FortiGate and Metabase securely?
Route FortiGate logs through a verified database or SIEM endpoint, secure that endpoint with IAM roles, then connect Metabase using read-only credentials that inherit those roles. This creates a clean layer between data ingestion and analytics, with minimum exposure risk.

The takeaway is simple: visibility without friction wins every time. With a few careful steps, FortiGate Metabase turns from a messy data handoff into a living system that shows you exactly what to fix next.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts