Skip to content

Commit 85b7c11

Browse files
committed
fixes
1 parent 5a17591 commit 85b7c11

2 files changed

Lines changed: 23 additions & 23 deletions

File tree

articles/sentinel/cef-syslog-ama-troubleshooting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Troubleshoot CEF and Syslog via AMA connectors in Microsoft Sentinel
33
description: Learn how to troubleshoot issues with CEF and Syslog data collection using the Azure Monitor Agent (AMA) in Microsoft Sentinel.
4-
author: edbaynash
4+
author: EdB-MSFT
55
ms.author: edbaynash
66
ms.topic: troubleshooting
7-
ms.date: 01/01/2026
8-
7+
ms.date: 01/12/2026
98

9+
# cusomtomer intent: As a Microsoft Sentinel administrator, I want to troubleshoot issues with CEF and Syslog data collection using the Azure Monitor Agent (AMA) so that I can ensure logs are being ingested correctly.
1010
---
1111

1212
# Troubleshoot CEF and Syslog via AMA connectors

articles/sentinel/connect-cef-syslog-ama.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: guywi-ms
55
ms.author: guywild
66
ms.topic: how-to
77
ms.custom: linux-related-content
8-
ms.date: 06/27/2024
8+
ms.date: 01/12/2026
99
appliesto:
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
- Microsoft Sentinel in the Azure portal
@@ -18,10 +18,10 @@ ms.collection: usx-security
1818

1919
# Ingest syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent
2020

21-
This article describes how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to quickly filter and ingest syslog messages, including messages in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. To learn more about these data connectors, see [Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
21+
This article shows you how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to filter and ingest syslog and CEF messages from Linux machines, network devices, and security appliances. To learn more about these data connectors, see [Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
2222

2323
> [!NOTE]
24-
> Container Insights now supports the automatic collection of Syslog events from Linux nodes in your AKS clusters. To learn more, see [Syslog collection with Container Insights](/azure/azure-monitor/containers/container-insights-syslog).
24+
> Container Insights supports automatic collection of syslog events from Linux nodes in your AKS clusters. Learn more in [Syslog collection with Container Insights](/azure/azure-monitor/containers/container-insights-syslog).
2525
2626
## Prerequisites
2727

@@ -33,7 +33,7 @@ Install the appropriate Microsoft Sentinel solution and make sure you have the p
3333

3434
- Install the appropriate solution from the **Content hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
3535

36-
- Identify which data connector the Microsoft Sentinel solution requires — **Syslog via AMA** or **Common Event Format (CEF) via AMA** and whether you need to install the **Syslog** or **Common Event Format** solution. To fulfill this prerequisite,
36+
- Identify which data connector the Microsoft Sentinel solution requires **Syslog via AMA** or **Common Event Format (CEF) via AMA** and whether you need to install the **Syslog** or **Common Event Format** solution. To fulfill this prerequisite,
3737

3838
- In the **Content hub**, select **Manage** on the installed solution and review the data connector listed.
3939

@@ -84,7 +84,7 @@ If your devices are sending syslog and CEF logs over TLS because, for example, y
8484

8585
## Configure the data connector
8686

87-
The setup process for the Syslog via AMA or Common Event Format (CEF) via AMA data connectors includes the following steps:
87+
The setup process for the Syslog via AMA or Common Event Format (CEF) via AMA data connectors includes the following steps:
8888

8989
1. Install the Azure Monitor Agent and create a Data Collection Rule (DCR) by using either of the following methods:
9090
- [Azure or Defender portal](?tabs=syslog%2Cportal#create-data-collection-rule-dcr)
@@ -351,7 +351,7 @@ It collects syslog event messages for:
351351

352352
If you're using a log forwarder, configure the syslog daemon to listen for messages from other machines, and open the necessary local ports.
353353

354-
1. From the connector page, copy the command line that appears under **Run the following command to install and apply the CEF collector:**
354+
1. From the connector page, copy the command line that appears under **Run the following command to install and apply the CEF collector:**.
355355

356356
:::image type="content" source="media/connect-cef-ama/run-install-script.png" alt-text="Screenshot of command line on connector page.":::
357357

@@ -374,7 +374,7 @@ If you're using a log forwarder, configure the syslog daemon to listen for messa
374374
> For more information, see [RSyslog](https://www.rsyslog.com/doc/master/configuration/actions.html) or [Syslog-ng](https://syslog-ng.github.io/).
375375

376376

377-
1. Check the service status
377+
1. Check the service status.
378378

379379
Check the AMA service status on your log forwarder:
380380
```bash
@@ -391,43 +391,43 @@ If you're using a log forwarder, configure the syslog daemon to listen for messa
391391

392392
## Configure the security device or appliance
393393

394-
Get specific instructions to configure your security device or appliance by going to one of the following articles:
394+
For instructions to configure your security device or appliance, see one of the following articles:
395395

396396
- [CEF via AMA data connector - Configure specific appliances and devices for Microsoft Sentinel data ingestion](unified-connector-cef-device.md)
397397
- [Syslog via AMA data connector - Configure specific appliances and devices for Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
398398

399-
Contact the solution provider for more information or where information is unavailable for the appliance or device.
399+
For more information about your appliance or device, contact the solution provider.
400400

401401
## Test the connector
402402

403-
Verify that logs messages from your linux machine or security devices and appliances are ingested into Microsoft Sentinel.
403+
Verify that log messages from your Linux machine or security devices and appliances are ingested into Microsoft Sentinel.
404404

405405
1. To validate that the syslog daemon is running on the UDP port and that the AMA is listening, run this command:
406406

407-
```
407+
```bash
408408
netstat -lnptv
409409
```
410410

411411
You should see the `rsyslog` or `syslog-ng` daemon listening on port 514.
412412

413413
1. To capture messages sent from a logger or a connected device, run this command in the background:
414414

415-
```
415+
```bash
416416
sudo tcpdump -i any port 514 or 28330 -A -vv &
417417
```
418-
1. After you complete the validation, we recommend that you stop the `tcpdump`: Type `fg` and then select <kbd>Ctrl</kbd>+<kbd>C</kbd>.
418+
1. After you complete the validation, stop `tcpdump`. Type `fg`, and then select <kbd>Ctrl</kbd>+<kbd>C</kbd>.
419419

420420

421421

422422
### Send test messages
423423

424-
To send demo messages, complete of the following steps:
424+
To send demo messages, complete one of the following steps:
425425

426426
1. Use the `nc` netcat utility. In this example, the utility reads data posted through the `echo` command with the newline switch turned off. The utility then writes the data to UDP port `514` on the localhost with no timeout. To execute the netcat utility, you might need to install another package.
427427

428-
```
429-
echo -n "<164>CEF:0|Mock-test|MOCK|common=event-format-test|end|TRAFFIC|1|rt=$common=event-formatted-receive_time" | nc -u -w0 localhost 514
430-
```
428+
```
429+
echo -n "<164>CEF:0|Mock-test|MOCK|common=event-format-test|end|TRAFFIC|1|rt=$common=event-formatted-receive_time" | nc -u -w0 localhost 514
430+
```
431431

432432
1. Use the `logger` command. This example writes the message to the `local 4` facility, at severity level `Warning`, to port `514`, on the local host, in the CEF RFC format. The `-t` and `--rfc3164` flags are used to comply with the expected RFC format.
433433

@@ -441,10 +441,10 @@ To send demo messages, complete of the following steps:
441441
echo -n "<164>%ASA-7-106010: Deny inbound TCP src inet:1.1.1.1 dst inet:2.2.2.2" | nc -u -w0 localhost 514
442442
```
443443

444-
After execute these commands, you should see messages arrive on port 514 and forward to port 28330.
444+
After you run these commands, messages arrive on port 514 and forward to port 28330.
445445

446446

447-
1. After sending test messages, query your Log Analytics workspace. Logs may take up to 20 minutes to appear in your workspace.
447+
1. After sending test messages, query your Log Analytics workspace. Logs can take up to 20 minutes to appear in your workspace.
448448

449449
For CEF logs:
450450

@@ -465,7 +465,7 @@ CommonSecurityLog
465465

466466
## Additional troubleshooting
467467

468-
If you aren't seeing any traffic on port 514 or your test messages aren't ingested, see [Troubleshoot Syslog and CEF via AMA connectors for Microsoft Sentinel](cef-syslog-ama-troubleshooting.md) for help troubleshooting.
468+
If you don't see traffic on port 514 or your test messages aren't ingested, see [Troubleshoot Syslog and CEF via AMA connectors for Microsoft Sentinel](cef-syslog-ama-troubleshooting.md) to troubleshoot.
469469

470470

471471
## Related content

0 commit comments

Comments
 (0)