Skip to content

Commit a5f742d

Browse files
Merge pull request #280368 from quillanogle/docs-editor/forward-syslog-monitor-agent-1720537624
Update forward-syslog-monitor-agent.md
2 parents b9e8623 + a76b81f commit a5f742d

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

articles/sentinel/forward-syslog-monitor-agent.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,15 @@ In Microsoft Sentinel or Azure Monitor, verify that Azure Monitor Agent is runni
6969

7070
Verify that the VM that's collecting the log data allows reception on port 514 TCP or UDP depending on the Syslog source. Then configure the built-in Linux Syslog daemon on the VM to listen for Syslog messages from your devices. After you finish those steps, configure your Linux-based device to send logs to your VM.
7171

72+
> [!NOTE]
73+
> If the firewall is running, a rule will need to be created to allow remote systems to reach the daemon’s syslog listener: `systemctl status firewalld.service`
74+
> 1. Add for tcp 514 (your zone/port/protocol may differ depending on your scenario)
75+
> `firewall-cmd --zone=public --add-port=514/tcp --permanent`
76+
> 2. Add for udp 514 (your zone/port/protocol may differ depending on your scenario)
77+
> `firewall-cmd --zone=public --add-port=514/udp --permanent`
78+
> 3. Restart the firewall service to ensure new rules take effect
79+
> `systemctl restart firewalld.service`
80+
7281
The following two sections cover how to add an inbound port rule for an Azure VM and configure the built-in Linux Syslog daemon.
7382

7483
### Allow inbound Syslog traffic on the VM

0 commit comments

Comments
 (0)