You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/cef-syslog-ama-troubleshooting.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Troubleshoot CEF and Syslog via AMA connectors in Microsoft Sentinel
3
3
description: Learn how to troubleshoot issues with CEF and Syslog data collection using the Azure Monitor Agent (AMA) in Microsoft Sentinel.
4
-
author: edbaynash
4
+
author: EdB-MSFT
5
5
ms.author: edbaynash
6
6
ms.topic: troubleshooting
7
-
ms.date: 01/01/2026
8
-
7
+
ms.date: 01/12/2026
9
8
9
+
# cusomtomer intent: As a Microsoft Sentinel administrator, I want to troubleshoot issues with CEF and Syslog data collection using the Azure Monitor Agent (AMA) so that I can ensure logs are being ingested correctly.
Copy file name to clipboardExpand all lines: articles/sentinel/connect-cef-syslog-ama.md
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: guywi-ms
5
5
ms.author: guywild
6
6
ms.topic: how-to
7
7
ms.custom: linux-related-content
8
-
ms.date: 06/27/2024
8
+
ms.date: 01/12/2026
9
9
appliesto:
10
10
- Microsoft Sentinel in the Microsoft Defender portal
11
11
- Microsoft Sentinel in the Azure portal
@@ -18,10 +18,10 @@ ms.collection: usx-security
18
18
19
19
# Ingest syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent
20
20
21
-
This article describes how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to quickly filter and ingest syslog messages, including messages in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. To learn more about these data connectors, see [Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
21
+
This article shows you how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to filter and ingest syslog and CEF messages from Linux machines, network devices, and security appliances. To learn more about these data connectors, see [Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
22
22
23
23
> [!NOTE]
24
-
> Container Insights now supports the automatic collection of Syslog events from Linux nodes in your AKS clusters. To learn more, see[Syslog collection with Container Insights](/azure/azure-monitor/containers/container-insights-syslog).
24
+
> Container Insights supports automatic collection of syslog events from Linux nodes in your AKS clusters. Learn more in[Syslog collection with Container Insights](/azure/azure-monitor/containers/container-insights-syslog).
25
25
26
26
## Prerequisites
27
27
@@ -33,7 +33,7 @@ Install the appropriate Microsoft Sentinel solution and make sure you have the p
33
33
34
34
- Install the appropriate solution from the **Content hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
35
35
36
-
- Identify which data connector the Microsoft Sentinel solution requires —**Syslog via AMA** or **Common Event Format (CEF) via AMA** and whether you need to install the **Syslog** or **Common Event Format** solution. To fulfill this prerequisite,
36
+
- Identify which data connector the Microsoft Sentinel solution requires **Syslog via AMA** or **Common Event Format (CEF) via AMA** and whether you need to install the **Syslog** or **Common Event Format** solution. To fulfill this prerequisite,
37
37
38
38
- In the **Content hub**, select **Manage** on the installed solution and review the data connector listed.
39
39
@@ -84,7 +84,7 @@ If your devices are sending syslog and CEF logs over TLS because, for example, y
84
84
85
85
## Configure the data connector
86
86
87
-
The setup process for the Syslog via AMA or Common Event Format (CEF) via AMA data connectors includes the following steps:
87
+
The setup process for the Syslog via AMA or Common Event Format (CEF) via AMA data connectors includes the following steps:
88
88
89
89
1. Install the Azure Monitor Agent and create a Data Collection Rule (DCR) by using either of the following methods:
90
90
-[Azure or Defender portal](?tabs=syslog%2Cportal#create-data-collection-rule-dcr)
@@ -351,7 +351,7 @@ It collects syslog event messages for:
351
351
352
352
If you're using a log forwarder, configure the syslog daemon to listen for messages from other machines, and open the necessary local ports.
353
353
354
-
1. From the connector page, copy the command line that appears under **Run the following command to install and apply the CEF collector:**
354
+
1. From the connector page, copy the command line that appears under **Run the following command to install and apply the CEF collector:**.
355
355
356
356
:::image type="content" source="media/connect-cef-ama/run-install-script.png" alt-text="Screenshot of command line on connector page.":::
357
357
@@ -374,7 +374,7 @@ If you're using a log forwarder, configure the syslog daemon to listen for messa
374
374
> For more information, see [RSyslog](https://www.rsyslog.com/doc/master/configuration/actions.html) or [Syslog-ng](https://syslog-ng.github.io/).
375
375
376
376
377
-
1. Check the service status
377
+
1. Check the service status.
378
378
379
379
Check the AMA service status on your log forwarder:
380
380
```bash
@@ -391,43 +391,43 @@ If you're using a log forwarder, configure the syslog daemon to listen for messa
391
391
392
392
## Configure the security device or appliance
393
393
394
-
Get specific instructions to configure your security device or appliance by going to one of the following articles:
394
+
For instructions to configure your security device or appliance, see one of the following articles:
395
395
396
396
- [CEF via AMA data connector - Configure specific appliances and devices for Microsoft Sentinel data ingestion](unified-connector-cef-device.md)
397
397
- [Syslog via AMA data connector - Configure specific appliances and devices for Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
398
398
399
-
Contact the solution provider formore information or where information is unavailable for the appliance or device.
399
+
For more information about your appliance or device, contact the solution provider.
400
400
401
401
## Test the connector
402
402
403
-
Verify that logs messages from your linux machine or security devices and appliances are ingested into Microsoft Sentinel.
403
+
Verify that log messages from your Linux machine or security devices and appliances are ingested into Microsoft Sentinel.
404
404
405
405
1. To validate that the syslog daemon is running on the UDP port and that the AMAis listening, run this command:
406
406
407
-
```
407
+
```bash
408
408
netstat -lnptv
409
409
```
410
410
411
411
You should see the `rsyslog`or`syslog-ng` daemon listening on port 514.
412
412
413
413
1. To capture messages sent from a logger or a connected device, run this command in the background:
414
414
415
-
```
415
+
```bash
416
416
sudo tcpdump -i any port 514or28330-A -vv &
417
417
```
418
-
1. After you complete the validation, we recommend that you stop the `tcpdump`: Type `fg`and then select <kbd>Ctrl</kbd>+<kbd>C</kbd>.
418
+
1. After you complete the validation, stop `tcpdump`. Type `fg`,and then select <kbd>Ctrl</kbd>+<kbd>C</kbd>.
419
419
420
420
421
421
422
422
### Send test messages
423
423
424
-
To send demo messages, complete of the following steps:
424
+
To send demo messages, complete one of the following steps:
425
425
426
426
1. Use the `nc` netcat utility. In this example, the utility reads data posted through the `echo` command with the newline switch turned off. The utility then writes the data to UDP port `514` on the localhost with no timeout. To execute the netcat utility, you might need to install another package.
1. Use the `logger` command. This example writes the message to the `local 4` facility, at severity level `Warning`, to port `514`, on the local host, in the CEFRFCformat. The `-t`and`--rfc3164` flags are used to comply with the expected RFCformat.
433
433
@@ -441,10 +441,10 @@ To send demo messages, complete of the following steps:
After execute these commands, you should see messages arrive on port 514and forward to port 28330.
444
+
After you run these commands, messages arrive on port 514and forward to port 28330.
445
445
446
446
447
-
1. After sending test messages, query your Log Analytics workspace. Logs may take up to 20 minutes to appear in your workspace.
447
+
1. After sending test messages, query your Log Analytics workspace. Logs can take up to 20 minutes to appear in your workspace.
448
448
449
449
For CEF logs:
450
450
@@ -465,7 +465,7 @@ CommonSecurityLog
465
465
466
466
## Additional troubleshooting
467
467
468
-
If you aren't seeing any traffic on port 514 or your test messages aren't ingested, see [Troubleshoot Syslog andCEF via AMA connectors for Microsoft Sentinel](cef-syslog-ama-troubleshooting.md) forhelp troubleshooting.
468
+
If you don't see traffic on port 514 or your test messages aren't ingested, see [Troubleshoot Syslog andCEF via AMA connectors for Microsoft Sentinel](cef-syslog-ama-troubleshooting.md) to troubleshoot.
0 commit comments