Syslog Collector

You can use a Syslog Collector to collect data from sources that follow the syslog protocol.

The log sources created using Syslog Collecter are not listed under Settings >> Configuration >> Devices.

To create Log Source:

  1. Go to Settings >> Log Sources from the navigation bar.

  2. Click Add Log Source.

  3. Click Create New and select Syslog Collector.

Source

In source, you can add details about the log source from where the Syslog Collector fetches logs.

  1. Click Source.

  2. Enter Name of Log Source.

  1. Enter Device Addresses. Device addresses are IP addresses or hostnames of the device whose logs to monitor.

  2. Choose the relevant Device Groups.

  3. Select Time Zone.

  4. Select the Risk values for Confidentiality, Integrity, and Availability.

../_images/Syslog_Source.png

Configuring Source

Connector

Connector is a pathway for transmitting logs from various sources to Logpoint. In connector, you can configure how the Syslog Collector and the log source communicate with each other.

  1. Click Connector.

  2. In Proxy Server, choose None, Use as Proxy or Uses proxy, depending on your setup. If you select:

    2.1. None, the device works as a Syslog Collector.

    2.1.1 Select Parser and Charset.

    2.1.2 Select a collector/forwarder from the Distributed Collector dropdown, if relevant. It lists all the distributed collectors and syslog forwarders configured in the Distributed Logpoints.

    2.2. Use as Proxy, the device is used as a proxy.

    2.2.1 Select Parser and Charset.

    2.2.2 Select a collector/forwarder from the Distributed Collector dropdown, if relevant. It lists all the distributed collectors and syslog forwarders configured in the Distributed Logpoints.

    2.3. Uses Proxy, a proxy device is used to collect the logs.

    2.3.1 Select a collector/forwarder from the Distributed Collector dropdown, if relevant. It lists all the distributed collectors and syslog forwarders configured in the Distributed Logpoints.

    2.3.2 Select a Proxy IP of the device and enter its Hostname.

../_images/Connector.png

Configuring Connector

Routing

In Routing, you can create repos and routing criteria. Repos are locations where incoming logs are stored and routing criteria is created to determine the conditions under which these logs are sent to repos.

  1. Click Routing and + Create Repo.

  2. Enter a Repo name.

  3. Enter the location in Path to store incoming logs.

  4. In Retention (Days), enter the number of days logs are kept in a repository before they are automatically deleted. The retention days must be at least 2 days.

  5. In Availability, select the Remote logpoint and Retention (Days).

  6. Click Create Repo.

../_images/createrepos.png

Creating a Repo

In Repo, select the created repo to store logs.

To create Routing Criteria:

  1. Click + Add row.

  2. Enter a Key and Value. The routing criteria is only applied to those logs which have this key value pair.

  3. Select an Operation for logs that have this key value pair.

    3.1. Select Store raw message to store both the incoming and the normalized logs in the selected repo.

    3.2. Select Discard raw message to discard the incoming logs and store the normalized ones.

    3.3. Select Discard entire event to discard both the incoming and the normalized logs.

  4. In Repository, select a repo to store logs.

../_images/createrepositories.png

Creating a Routing Criteria

  1. Click the (uninstall) icon under Action to delete the created routing criteria.

Normalization

In normalization, you can select normalizers for the incoming logs. Normalizers transform incoming logs into a standardized format for consistent and efficient analysis.

  1. Click Normalization.

  2. You can either select a previously created normalization policy from the Select Normalization Policy dropdown or select a Normalizer from the list and click the swap(swap) icon.

../_images/log_sources_norm.png

Adding Normalizers

Enrichment

In enrichment, you can select an enrichment policy for the incoming logs. Enrichment policies are used to add additional information to a log, such as user information, device type or geolocation, before analyzing it. For more information on enrichment, go to Enrichment Policies.

  1. Click Enrichment.

  2. Select an Enrichment Policy.

Click Create Log Source to save the configurations of Source, Connector, Routing, Normalization, and Enrichment.


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support