Collecting syslog messages


System logging protocol (syslog) is an event-logging standard that enables devices and applications to send data about status, events, diagnostics, and so on. Syslog contains information about the operations, errors, and status of devices. Monitoring syslog messages helps you to keep track of your system and network events, detect security threats, and troubleshoot problems.

The following image shows how syslog messages are collected by BMC Helix Log Analytics in a local setup:

LocalSyslogCollection.png

The following image shows how syslog messages are collected by BMC Helix Log Analytics in a remote setup:

RemoteSyslogCollection.png

The following video (2:19) provides you an overview of monitoring syslog messages in BMC Helix Log Analytics.


icon-play@2x.pngWatch the YouTube video about overview of monitoring syslog messages in BMC Helix Log Analytics.

Before you begin

  • Forward all syslog messages to a computer within your IP network from where BMC Helix Log Analytics will collect them.
  • Download and install a Linux (RHEL and CentOS) or Windows connector. For more information, see Installing-and-managing-connectors.
  • Create a parsing rule of type Syslogs. For more information, see Creating-a-parsing-rule.
  • Create a filtering rule. For more information, see Creating-a-filtering-rule.

To collect syslog messages

  1. Click the Collection menu and select Collection Policies.
  2. On the Collection Policies page, click Create.
  3. Enter the policy information:
    1. Enter a unique name and description for the policy.
    2. From the Collection Type list, select Syslog.
  4. Enter the following information about the connector:
    1. From the Connector Type list, select Linux Connector (RHEL8), Linux Connector (CentOS 7.9), or Windows Connector.
    2. In Connector Selection Criteria, create the connector selection criteria to identify connectors for collection.
      When you click in the box, you are prompted to make a selection. Each time you make a selection, you are progressively prompted to make another selection. 
      The selection criteria consist of an opening parenthesis, followed by the slot name, the operator, the slot value (which can be a string based on the type of slot selected), and the closing parenthesis. You can optionally select the logical operator AND or OR to add additional conditions. Specifying the opening and closing parentheses is optional.
      The connector fields that are available to create the selection criteria are status, name, version, host_name, ip, and tags. 

      Important

      The values that you enter for a field in the selection criteria are case-sensitive. For example, if the host name is WebServer.example.com, add the selection criteria as ( host_name Equals WebServer.example.com ). If you enter, ( host_name Equals webserver.example.com ), the connector is not selected. To add case-insensitive values, use the Equals ignore case operator.

  5. Enter the following information about log collection:
    1. In the Configuration step, click Configure.
    2. In the Customize Log Data panel, from the Protocol list, select the protocol that you want to select to communicate with the Linux computer.
    3. Enter the bind address (the IP address of the computer where you have forwarded all syslog messages of your IP network) and port that the protocol will use to establish the connection.
    4. In the Message Length Limit field, enter the maximum length of the syslog messages that you are collecting (in bytes).
      The maximum supported length is 5120 bytes.
    5. Select the Ignore Unparsed Syslogs to ignore the collection of logs that are not parsed by the parsing rule.
    6. Click Save.
  6. In the Parsing Rule step, select the parsing rule that you have created.
    If you have not created a parsing rule, see Creating-a-parsing-rule for instructions to create a parsing rule of type Syslog.
  7. From the Filtering Rule list, select the filtering rule that you have created.
    If you have not created a filtering rule, see Creating-a-filtering-rule for instructions.
  8. To start collecting logs, select the Enable Collection Policy check box.
  9. Click Save.
    The created policy is shown on the Collection Policies page.
  10. To edit, enable, disable, or delete a policy, use the Actions menu.

To verify log collection

To verify whether the log collection has started, select Explorer > Discover and use the tags or time range to view the collected logs.

To view the out-of-the-box Syslog dashboard in BMC Helix Dashboards

  1. Click the Dashboards menu.
  2. Select Manage Dashboards.
    The Log Analytics folder is displayed.
  3. Click the Syslog dashboard.

Learn more

Read the following blog to learn how you can gain network visibility and performance by monitoring syslog messages: Gain Network Visibility and Performance with Syslog Monitoring.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*