You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/troubleshooting-cef-syslog.md
+27-27Lines changed: 27 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,9 +15,9 @@ ms.date: 06/18/2024
15
15
16
16
This article describes common methods for verifying and troubleshooting a CEF or Syslog data connector for Microsoft Sentinel.
17
17
18
-
For example, if your log messages aren't appearing in the *Syslog* or *CommonSecurityLog* tables, your data source might not be connecting properly. There might also be another reason your data is not being received.
18
+
For example, if your log messages aren't appearing in the *Syslog* or *CommonSecurityLog* tables, your data source might not be connecting properly. There might also be another reason your data isn't being received.
19
19
20
-
Other symptoms of a failed connector deployment include when either the **security_events.conf** or the **security-omsagent.config.conf** files are missing, or if the rsyslog server is not listening on port 514.
20
+
Other symptoms of a failed connector deployment include when either the **security_events.conf** or the **security-omsagent.config.conf** files are missing, or if the rsyslog server isn't listening on port 514.
21
21
22
22
For more information, see [Connect your external solution using Common Event Format](connect-common-event-format.md) and [Collect data from Linux-based sources using Syslog](connect-syslog.md).
23
23
@@ -31,7 +31,7 @@ This article shows you how to troubleshoot CEF or Syslog connectors with the Log
31
31
32
32
## How to use this article
33
33
34
-
When information in this article is relevant only for Syslog or only for CEF connectors, it'll be presented in separate tabs. Make sure that you're using the instructions on the correct tab for your connector type.
34
+
When information in this article is relevant only for Syslog or only for CEF connectors, it's presented in separate tabs. Make sure that you're using the instructions on the correct tab for your connector type.
35
35
36
36
For example, if you're troubleshooting a CEF connector, start with [Validate CEF connectivity](#validate-cef-connectivity). If you're troubleshooting a Syslog connector, start with [Verify your data connector prerequisites](#verify-your-data-connector-prerequisites).
37
37
@@ -49,23 +49,23 @@ This procedure is relevant only for CEF connections, and is *not* relevant for S
49
49
50
50
- You must have **python 2.7** or **3** installed on your log forwarder machine. Use the `python --version` command to check.
51
51
52
-
- You may need the Workspace ID and Workspace Primary Key at some point in this process. You can find them in the workspace resource, under **Agents management**.
52
+
- You might need the Workspace ID and Workspace Primary Key at some point in this process. You can find them in the workspace resource, under **Agents management**.
53
53
54
-
1. From the Microsoft Sentinel navigation menu, open **Logs**. Run a query using the **CommonSecurityLog** schema to see if you are receiving logs from your security solution.
54
+
1. From the Microsoft Sentinel navigation menu, open **Logs**. Run a query using the **CommonSecurityLog** schema to see if you're receiving logs from your security solution.
55
55
56
-
It may take about 20 minutes until your logs start to appear in **Log Analytics**.
56
+
It might take about 20 minutes until your logs start to appear in **Log Analytics**.
57
57
58
58
1. If you don't see any results from the query, verify that your security solution is generating log messages. Or, try taking some actions to generate log messages, and verify that the messages are forwarded to your designated Syslog forwarder machine.
59
59
60
-
1.Run the following script on the log forwarder (applying the Workspace ID in place of the placeholder) to check connectivity between your security solution, the log forwarder, and Microsoft Sentinel. This script checks that the daemon is listening on the correct ports, that the forwarding is properly configured, and that nothing is blocking communication between the daemon and the Log Analytics agent. It also sends mock messages 'TestCommonEventFormat' to check end-to-end connectivity. <br>
60
+
1.To check connectivity between your security solution, the log forwarder, and Microsoft Sentinel, run the following script on the log forwarder (applying the Workspace ID in place of the placeholder). This script checks that the daemon is listening on the correct ports, that the forwarding is properly configured, and that nothing is blocking communication between the daemon and the Log Analytics agent. It also sends mock messages 'TestCommonEventFormat' to check end-to-end connectivity. <br>
- You may get a message directing you to run a command to correct an issue with the **mapping of the *Computer* field**. See the [explanation in the validation script](#mapping-command) for details.
66
+
- You might get a message directing you to run a command to correct an issue with the **mapping of the *Computer* field**. See the [explanation in the validation script](#mapping-command) for details.
67
67
68
-
- You may get a message directing you to run a command to correct an issue with the **parsing of Cisco ASA firewall logs**. See the [explanation in the validation script](#parsing-command) for details.
68
+
- You might get a message directing you to run a command to correct an issue with the **parsing of Cisco ASA firewall logs**. See the [explanation in the validation script](#parsing-command) for details.
69
69
70
70
### CEF validation script explained
71
71
@@ -105,7 +105,7 @@ For an rsyslog daemon, the CEF validation script runs the following checks:
105
105
grep -i "return ident if ident.include?('%ASA')" /opt/microsoft/omsagent/plugin/security_lib.rb
106
106
```
107
107
108
-
- <a name="parsing-command"></a>If there is an issue with the parsing, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct parsing and restart the agent.
108
+
- <a name="parsing-command"></a>If there's an issue with the parsing, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct parsing and restarts the agent.
109
109
110
110
```bash
111
111
# Cisco ASA parsing fix
@@ -118,7 +118,7 @@ For an rsyslog daemon, the CEF validation script runs the following checks:
- <a name="mapping-command"></a>If there is an issue with the mapping, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct mapping and restart the agent.
121
+
- <a name="mapping-command"></a>If there's an issue with the mapping, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct mapping and restarts the agent.
122
122
123
123
```bash
124
124
# Computer field mapping fix
@@ -200,7 +200,7 @@ For a syslog-ng daemon, the CEF validation script runs the following checks:
200
200
grep -i "return ident if ident.include?('%ASA')" /opt/microsoft/omsagent/plugin/security_lib.rb
201
201
```
202
202
203
-
- <a name="parsing-command"></a>If there is an issue with the parsing, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct parsing and restart the agent.
203
+
- <a name="parsing-command"></a>If there's an issue with the parsing, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct parsing and restarts the agent.
204
204
205
205
```bash
206
206
# Cisco ASA parsing fix
@@ -213,7 +213,7 @@ For a syslog-ng daemon, the CEF validation script runs the following checks:
- <a name="mapping-command"></a>If there is an issue with the mapping, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct mapping and restart the agent.
216
+
- <a name="mapping-command"></a>If there's an issue with the mapping, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct mapping and restarts the agent.
217
217
218
218
```bash
219
219
# Computer field mapping fix
@@ -266,7 +266,7 @@ For a syslog-ng daemon, the CEF validation script runs the following checks:
266
266
267
267
### Troubleshooting Syslog data connectors
268
268
269
-
If you are troubleshooting a Syslog data connector, start with verifying your prerequisites in the [next section](#verify-your-data-connector-prerequisites), using the information in the **Syslog** tab.
269
+
If you're troubleshooting a Syslog data connector, start with verifying your prerequisites in the [next section](#verify-your-data-connector-prerequisites), using the information in the **Syslog** tab.
270
270
271
271
---
272
272
@@ -290,7 +290,7 @@ If you're using an Azure Virtual Machine as a CEF collector, verify the followin
290
290
291
291
### On-premises or a non-Azure Virtual Machine
292
292
293
-
If you are using an on-premises machine or a non-Azure virtual machine for your data connector, make sure that you've run the installation script on a fresh installation of a supported Linux operating system:
293
+
If you're using an on-premises machine or a non-Azure virtual machine for your data connector, make sure that you've run the installation script on a fresh installation of a supported Linux operating system:
294
294
295
295
> [!TIP]
296
296
> You can also find this script from the **Common Event Format** data connector page in Microsoft Sentinel.
@@ -327,7 +327,7 @@ if $rawmsg contains "CEF:" or $rawmsg contains "ASA-" then @@127.0.0.1:25226
327
327
328
328
If you're using an Azure Virtual Machine as a Syslog collector, verify the following:
329
329
330
-
- While you are setting up your Syslog data connector, make sure to turn off your [Microsoft Defender for Cloud auto-provisioning settings](../security-center/security-center-enable-data-collection.md) for the [MMA/OMS agent](connect-windows-security-events.md#connector-options).
330
+
- While you're setting up your Syslog data connector, make sure to turn off your [Microsoft Defender for Cloud auto-provisioning settings](../security-center/security-center-enable-data-collection.md) for the [MMA/OMS agent](connect-windows-security-events.md#connector-options).
331
331
332
332
You can turn them back on after your data connector is completely set up.
333
333
@@ -387,13 +387,13 @@ This section describes how to troubleshoot issues that are certainly derived fro
387
387
388
388
1. Do one of the following:
389
389
390
-
- If you do not see any packets arriving, confirm the NSG security group permissions and the routing path to the Syslog Collector.
390
+
- If you don't see any packets arriving, confirm the NSG security group permissions and the routing path to the Syslog Collector.
391
391
392
-
- If you do see packets arriving, confirm that they are not being rejected.
392
+
- If you do see packets arriving, confirm that they aren't being rejected.
393
393
394
-
If you see rejected packets, confirm that the IP tables are not blocking the connections.
394
+
If you see rejected packets, confirm that the IP tables aren't blocking the connections.
395
395
396
-
To confirm that packets are not being rejected, run:
396
+
To confirm that packets aren't being rejected, run:
397
397
398
398
```config
399
399
watch -n 2 -d iptables -nvL
@@ -440,13 +440,13 @@ This section describes how to troubleshoot issues that are certainly derived fro
440
440
441
441
1. Do one of the following:
442
442
443
-
- If you do not see any packets arriving, confirm the NSG security group permissions and the routing path to the Syslog Collector.
443
+
- If you don't see any packets arriving, confirm the NSG security group permissions and the routing path to the Syslog Collector.
444
444
445
-
- If you do see packets arriving, confirm that they are not being rejected.
445
+
- If you do see packets arriving, confirm that they aren't being rejected.
446
446
447
-
If you see rejected packets, confirm that the IP tables are not blocking the connections.
447
+
If you see rejected packets, confirm that the IP tables aren't blocking the connections.
448
448
449
-
To confirm that packets are not being rejected, run:
449
+
To confirm that packets aren't being rejected, run:
450
450
451
451
```config
452
452
watch -n 2 -d iptables -nvL
@@ -577,7 +577,7 @@ This procedure describes how to verify whether a firewall policy is blocking the
577
577
578
578
# [CEF](#tab/cef)
579
579
580
-
If the steps described earlier in this article do not solve your issue, you may have a connectivity problem between the OMS Agent and the Microsoft Sentinel workspace.
580
+
If the steps described earlier in this article don't solve your issue, you may have a connectivity problem between the OMS Agent and the Microsoft Sentinel workspace.
581
581
582
582
In such cases, continue troubleshooting by verifying the following:
583
583
@@ -604,7 +604,7 @@ A log entry is returned if the agent is communicating successfully. Otherwise, t
604
604
605
605
# [Syslog](#tab/syslog)
606
606
607
-
If the steps described earlier in this article do not solve your issue, you may have a connectivity problem between the OMS Agent and the Microsoft Sentinel workspace.
607
+
If the steps described earlier in this article don't solve your issue, you may have a connectivity problem between the OMS Agent and the Microsoft Sentinel workspace.
608
608
609
609
In such cases, continue troubleshooting by verifying the following:
610
610
@@ -634,7 +634,7 @@ A log entry is returned if the agent is communicating successfully. Otherwise, t
634
634
635
635
## Next steps
636
636
637
-
If the troubleshooting steps in this article have not helped your issue, open a support ticket or use the Microsoft Sentinel community resources. For more information, see [Useful resources for working with Microsoft Sentinel](resources.md).
637
+
If the troubleshooting steps in this article haven't helped your issue, open a support ticket or use the Microsoft Sentinel community resources. For more information, see [Useful resources for working with Microsoft Sentinel](resources.md).
638
638
639
639
To learn more about Microsoft Sentinel, see the following articles:
0 commit comments