You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/unified-connector-custom-device.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ Follow these steps to ingest log messages from Apache HTTP Server:
73
73
74
74
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
75
75
76
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
76
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
77
77
78
78
## Apache Tomcat
79
79
@@ -90,7 +90,7 @@ Follow these steps to ingest log messages from Apache Tomcat:
90
90
91
91
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
92
92
93
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
93
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
94
94
95
95
## Cisco Meraki
96
96
@@ -176,7 +176,7 @@ Follow these steps to ingest log messages from Cisco Meraki:
176
176
177
177
1. Configure and connect the Cisco Meraki device(s): follow the [instructions provided by Cisco](https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/Meraki_Device_Reporting_-_Syslog%2C_SNMP%2C_and_API) for sending syslog messages. Use the IP address or hostname of the virtual machine where the Azure Monitor Agent is installed.
178
178
179
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
179
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
180
180
181
181
## JBoss Enterprise Application Platform
182
182
@@ -194,7 +194,7 @@ Follow these steps to ingest log messages from JBoss Enterprise Application Plat
194
194
195
195
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
196
196
197
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
197
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
198
198
199
199
## JuniperIDP
200
200
@@ -264,7 +264,7 @@ Follow these steps to ingest log messages from JuniperIDP:
264
264
265
265
1. For the instructions to configure the Juniper IDP appliance to send syslog messages to an external server, see [SRX Getting Started - Configure System Logging.](https://supportportal.juniper.net/s/article/SRX-Getting-Started-Configure-System-Logging).
266
266
267
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
267
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
268
268
269
269
## MarkLogic Audit
270
270
@@ -290,7 +290,7 @@ Follow these steps to ingest log messages from MarkLogic Audit:
290
290
1. Validate by selecting OK.
291
291
1. Refer to MarkLogic documentation for [more details and configuration options](https://docs.marklogic.com/guide/admin/auditing).
292
292
293
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
293
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
294
294
295
295
## MongoDB Audit
296
296
@@ -314,7 +314,7 @@ Follow these steps to ingest log messages from MongoDB Audit:
314
314
1. Set the `path` parameter to `/data/db/auditlog.json`.
315
315
1. Refer to MongoDB documentation for [more parameters and details](https://www.mongodb.com/docs/manual/tutorial/configure-auditing/).
316
316
317
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
317
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
318
318
319
319
## NGINX HTTP Server
320
320
@@ -331,7 +331,7 @@ Follow these steps to ingest log messages from NGINX HTTP Server:
331
331
332
332
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
333
333
334
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
334
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
335
335
336
336
## Oracle WebLogic Server
337
337
@@ -349,7 +349,7 @@ Follow these steps to ingest log messages from Oracle WebLogic Server:
349
349
350
350
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
351
351
352
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
352
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
353
353
354
354
## PostgreSQL Events
355
355
@@ -372,7 +372,7 @@ Follow these steps to ingest log messages from PostgreSQL Events:
372
372
1. Set `logging_collector=on`
373
373
1. Refer to PostgreSQL documentation for [more parameters and details](https://www.postgresql.org/docs/current/runtime-config-logging.html).
374
374
375
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
375
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
376
376
377
377
## SecurityBridge Threat Detection for SAP
378
378
@@ -389,7 +389,7 @@ Follow these steps to ingest log messages from SecurityBridge Threat Detection f
389
389
390
390
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
391
391
392
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
392
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
393
393
394
394
## SquidProxy
395
395
@@ -407,7 +407,7 @@ Follow these steps to ingest log messages from SquidProxy:
407
407
408
408
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
409
409
410
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
410
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
411
411
412
412
## Ubiquiti UniFi
413
413
@@ -475,7 +475,7 @@ Follow these steps to ingest log messages from Ubiquiti UniFi:
475
475
1. Follow the [instructions provided by Ubiquiti](https://help.ui.com/hc/en-us/categories/6583256751383) to enable syslog and optionally debugging logs.
476
476
1. Select Settings > System Settings > Controller Configuration > Remote Logging and enable syslog.
477
477
478
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
478
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
479
479
480
480
## VMware vCenter
481
481
@@ -551,7 +551,7 @@ Follow these steps to ingest log messages from VMware vCenter:
551
551
1. Follow the [instructions provided by VMware](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.monitoring.doc/GUID-9633A961-A5C3-4658-B099-B81E0512DC21.html) for sending syslog messages.
552
552
1. Use the IP address or hostname of the machine where the Azure Monitor Agent is installed.
553
553
554
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
554
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
555
555
556
556
## Zscaler Private Access (ZPA)
557
557
@@ -561,7 +561,7 @@ Follow these steps to ingest log messages from Zscaler Private Access (ZPA):
561
561
562
562
1. Log storage location: Create a log file on your external syslog server. Grant the syslog daemon write permissions to the file. Install the AMA on the external syslog server if it's not already installed. Enter this filename and path in the **File pattern** field in the connector, or in place of the `{LOCAL_PATH_FILE}` placeholder in the DCR.
563
563
564
-
1. Configure the syslog daemon to export its vCenter log messages to a temporary text file so the AMA can collect them.
564
+
1. Configure the syslog daemon to export its ZPA log messages to a temporary text file so the AMA can collect them.
565
565
566
566
# [rsyslog](#tab/rsyslog)
567
567
@@ -619,7 +619,7 @@ Follow these steps to ingest log messages from Zscaler Private Access (ZPA):
619
619
1. Follow the [instructions provided by ZPA](https://help.zscaler.com/zpa/configuring-log-receiver). Select JSON as the log template.
620
620
1. Select Settings > System Settings > Controller Configuration > Remote Logging and enable syslog.
621
621
622
-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
622
+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
0 commit comments