Linux Syslog in Log Analytics

Monitoring & Logging on-prem Linux devices/servers takes into consideration that the majority of network devices and network appliances are all Linux based and there are also a large number of Linux servers in circulation.

A large number of my customers use a large number of Linux servers and network devices – which all need to be monitored centrally using a service which is cloud agnostic and full hybrid – Log Analytics.

Syslog & CEF

Here’s how it works…. Focusing on the center piece of the above diagram:

If the Log Analytics agent computer has an Rsyslog daemon:

  • The Azure Security Center config file for rsyslog is located at /etc/rsyslog.d/security-config-omsagent.conf
  • The Log Analytics config file for rsyslog is located at /etc/rsyslog.d/95-omsagent.conf

If the Log Analytics agent computer has an Syslog-ng daemon:

  • The Azure Security Center config file for syslog-ng is location at /etc/syslog-ng/security-config-omsagent.conf
  • The Log Analytics config file for syslog-ng is location at /etc/syslog-ng/syslog-ng.conf

Log Analytics / Azure Security Center support collection of messages sent by rsyslog or syslog-ng, where rsyslog is the default daemon. The default syslog daemon on version 5 of Red Hat Enterprise Linux, CentOS, and Oracle Linux version (sysklog) is not supported for syslog event collection. To collect syslog data from this version of these distributions, the rsyslog daemon should be installed and configured to replace sysklog.

SNMP to Log Analytics

SNMP data can also be collected in two ways: with polls – where a managing system probes an SNMP agent to gather values for specific properties, or with traps – where an SNMP agent forwards events or notifications to a managing system. Traps are most often used as event notifications, while polls are more appropriate for stateful health detection or collecting performance metrics.

More info and how to set this up, see this blog.

Why to Log Analytics?

So that everything is logged into the one place – Azure, one single bill from one of the most trusted enterprise companies on the planet – Microsoft and using a simple yet powerful query language that is optimised to perform and handle free-text data at cloud-scale. All Azure monitoring services, e.g. Azure Monitor, Log Analytics, Azure Security Center, Network Watcher plus more all leverage the same backend query language – screenshot below:

2018-09-03_1740

Also… as you know you can send practically any data to Log Analytics, how you want and when you want.

Then you can easily create a whole bunch of awesome dashboards to report back on.

Further Reading:

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s