Skip to content

Commit c37c190

Browse files
committed
More Acrolinx
1 parent 20778d0 commit c37c190

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

articles/sentinel/troubleshooting-cef-syslog.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ ms.date: 06/18/2024
1515
1616
This article describes common methods for verifying and troubleshooting a CEF or Syslog data connector for Microsoft Sentinel.
1717

18-
For example, if your log messages aren't appearing in the *Syslog* or *CommonSecurityLog* tables, your data source might not be connecting properly. There might also be another reason your data is not being received.
18+
For example, if your log messages aren't appearing in the *Syslog* or *CommonSecurityLog* tables, your data source might not be connecting properly. There might also be another reason your data isn't being received.
1919

20-
Other symptoms of a failed connector deployment include when either the **security_events.conf** or the **security-omsagent.config.conf** files are missing, or if the rsyslog server is not listening on port 514.
20+
Other symptoms of a failed connector deployment include when either the **security_events.conf** or the **security-omsagent.config.conf** files are missing, or if the rsyslog server isn't listening on port 514.
2121

2222
For more information, see [Connect your external solution using Common Event Format](connect-common-event-format.md) and [Collect data from Linux-based sources using Syslog](connect-syslog.md).
2323

@@ -31,7 +31,7 @@ This article shows you how to troubleshoot CEF or Syslog connectors with the Log
3131
3232
## How to use this article
3333

34-
When information in this article is relevant only for Syslog or only for CEF connectors, it'll be presented in separate tabs. Make sure that you're using the instructions on the correct tab for your connector type.
34+
When information in this article is relevant only for Syslog or only for CEF connectors, it's presented in separate tabs. Make sure that you're using the instructions on the correct tab for your connector type.
3535

3636
For example, if you're troubleshooting a CEF connector, start with [Validate CEF connectivity](#validate-cef-connectivity). If you're troubleshooting a Syslog connector, start with [Verify your data connector prerequisites](#verify-your-data-connector-prerequisites).
3737

@@ -49,23 +49,23 @@ This procedure is relevant only for CEF connections, and is *not* relevant for S
4949

5050
- You must have **python 2.7** or **3** installed on your log forwarder machine. Use the `python --version` command to check.
5151

52-
- You may need the Workspace ID and Workspace Primary Key at some point in this process. You can find them in the workspace resource, under **Agents management**.
52+
- You might need the Workspace ID and Workspace Primary Key at some point in this process. You can find them in the workspace resource, under **Agents management**.
5353

54-
1. From the Microsoft Sentinel navigation menu, open **Logs**. Run a query using the **CommonSecurityLog** schema to see if you are receiving logs from your security solution.
54+
1. From the Microsoft Sentinel navigation menu, open **Logs**. Run a query using the **CommonSecurityLog** schema to see if you're receiving logs from your security solution.
5555

56-
It may take about 20 minutes until your logs start to appear in **Log Analytics**.
56+
It might take about 20 minutes until your logs start to appear in **Log Analytics**.
5757

5858
1. If you don't see any results from the query, verify that your security solution is generating log messages. Or, try taking some actions to generate log messages, and verify that the messages are forwarded to your designated Syslog forwarder machine.
5959

60-
1. Run the following script on the log forwarder (applying the Workspace ID in place of the placeholder) to check connectivity between your security solution, the log forwarder, and Microsoft Sentinel. This script checks that the daemon is listening on the correct ports, that the forwarding is properly configured, and that nothing is blocking communication between the daemon and the Log Analytics agent. It also sends mock messages 'TestCommonEventFormat' to check end-to-end connectivity. <br>
60+
1. To check connectivity between your security solution, the log forwarder, and Microsoft Sentinel, run the following script on the log forwarder (applying the Workspace ID in place of the placeholder). This script checks that the daemon is listening on the correct ports, that the forwarding is properly configured, and that nothing is blocking communication between the daemon and the Log Analytics agent. It also sends mock messages 'TestCommonEventFormat' to check end-to-end connectivity. <br>
6161

6262
```bash
6363
sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py [WorkspaceID]
6464
```
6565

66-
- You may get a message directing you to run a command to correct an issue with the **mapping of the *Computer* field**. See the [explanation in the validation script](#mapping-command) for details.
66+
- You might get a message directing you to run a command to correct an issue with the **mapping of the *Computer* field**. See the [explanation in the validation script](#mapping-command) for details.
6767

68-
- You may get a message directing you to run a command to correct an issue with the **parsing of Cisco ASA firewall logs**. See the [explanation in the validation script](#parsing-command) for details.
68+
- You might get a message directing you to run a command to correct an issue with the **parsing of Cisco ASA firewall logs**. See the [explanation in the validation script](#parsing-command) for details.
6969

7070
### CEF validation script explained
7171

@@ -105,7 +105,7 @@ For an rsyslog daemon, the CEF validation script runs the following checks:
105105
grep -i "return ident if ident.include?('%ASA')" /opt/microsoft/omsagent/plugin/security_lib.rb
106106
```
107107

108-
- <a name="parsing-command"></a>If there is an issue with the parsing, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct parsing and restart the agent.
108+
- <a name="parsing-command"></a>If there's an issue with the parsing, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct parsing and restarts the agent.
109109
110110
```bash
111111
# Cisco ASA parsing fix
@@ -118,7 +118,7 @@ For an rsyslog daemon, the CEF validation script runs the following checks:
118118
grep -i "'Host' => record\['host'\]" /opt/microsoft/omsagent/plugin/filter_syslog_security.rb
119119
```
120120
121-
- <a name="mapping-command"></a>If there is an issue with the mapping, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct mapping and restart the agent.
121+
- <a name="mapping-command"></a>If there's an issue with the mapping, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct mapping and restarts the agent.
122122

123123
```bash
124124
# Computer field mapping fix
@@ -200,7 +200,7 @@ For a syslog-ng daemon, the CEF validation script runs the following checks:
200200
grep -i "return ident if ident.include?('%ASA')" /opt/microsoft/omsagent/plugin/security_lib.rb
201201
```
202202
203-
- <a name="parsing-command"></a>If there is an issue with the parsing, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct parsing and restart the agent.
203+
- <a name="parsing-command"></a>If there's an issue with the parsing, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct parsing and restarts the agent.
204204
205205
```bash
206206
# Cisco ASA parsing fix
@@ -213,7 +213,7 @@ For a syslog-ng daemon, the CEF validation script runs the following checks:
213213
grep -i "'Host' => record\['host'\]" /opt/microsoft/omsagent/plugin/filter_syslog_security.rb
214214
```
215215
216-
- <a name="mapping-command"></a>If there is an issue with the mapping, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct mapping and restart the agent.
216+
- <a name="mapping-command"></a>If there's an issue with the mapping, the script produces an error message directing you to **manually run the following command** (applying the Workspace ID in place of the placeholder). The command ensures the correct mapping and restarts the agent.
217217
218218
```bash
219219
# Computer field mapping fix
@@ -266,7 +266,7 @@ For a syslog-ng daemon, the CEF validation script runs the following checks:
266266
267267
### Troubleshooting Syslog data connectors
268268
269-
If you are troubleshooting a Syslog data connector, start with verifying your prerequisites in the [next section](#verify-your-data-connector-prerequisites), using the information in the **Syslog** tab.
269+
If you're troubleshooting a Syslog data connector, start with verifying your prerequisites in the [next section](#verify-your-data-connector-prerequisites), using the information in the **Syslog** tab.
270270
271271
---
272272
@@ -290,7 +290,7 @@ If you're using an Azure Virtual Machine as a CEF collector, verify the followin
290290
291291
### On-premises or a non-Azure Virtual Machine
292292
293-
If you are using an on-premises machine or a non-Azure virtual machine for your data connector, make sure that you've run the installation script on a fresh installation of a supported Linux operating system:
293+
If you're using an on-premises machine or a non-Azure virtual machine for your data connector, make sure that you've run the installation script on a fresh installation of a supported Linux operating system:
294294
295295
> [!TIP]
296296
> You can also find this script from the **Common Event Format** data connector page in Microsoft Sentinel.
@@ -327,7 +327,7 @@ if $rawmsg contains "CEF:" or $rawmsg contains "ASA-" then @@127.0.0.1:25226
327327
328328
If you're using an Azure Virtual Machine as a Syslog collector, verify the following:
329329
330-
- While you are setting up your Syslog data connector, make sure to turn off your [Microsoft Defender for Cloud auto-provisioning settings](../security-center/security-center-enable-data-collection.md) for the [MMA/OMS agent](connect-windows-security-events.md#connector-options).
330+
- While you're setting up your Syslog data connector, make sure to turn off your [Microsoft Defender for Cloud auto-provisioning settings](../security-center/security-center-enable-data-collection.md) for the [MMA/OMS agent](connect-windows-security-events.md#connector-options).
331331
332332
You can turn them back on after your data connector is completely set up.
333333
@@ -387,13 +387,13 @@ This section describes how to troubleshoot issues that are certainly derived fro
387387
388388
1. Do one of the following:
389389
390-
- If you do not see any packets arriving, confirm the NSG security group permissions and the routing path to the Syslog Collector.
390+
- If you don't see any packets arriving, confirm the NSG security group permissions and the routing path to the Syslog Collector.
391391
392-
- If you do see packets arriving, confirm that they are not being rejected.
392+
- If you do see packets arriving, confirm that they aren't being rejected.
393393
394-
If you see rejected packets, confirm that the IP tables are not blocking the connections.
394+
If you see rejected packets, confirm that the IP tables aren't blocking the connections.
395395
396-
To confirm that packets are not being rejected, run:
396+
To confirm that packets aren't being rejected, run:
397397
398398
```config
399399
watch -n 2 -d iptables -nvL
@@ -440,13 +440,13 @@ This section describes how to troubleshoot issues that are certainly derived fro
440440
441441
1. Do one of the following:
442442
443-
- If you do not see any packets arriving, confirm the NSG security group permissions and the routing path to the Syslog Collector.
443+
- If you don't see any packets arriving, confirm the NSG security group permissions and the routing path to the Syslog Collector.
444444
445-
- If you do see packets arriving, confirm that they are not being rejected.
445+
- If you do see packets arriving, confirm that they aren't being rejected.
446446
447-
If you see rejected packets, confirm that the IP tables are not blocking the connections.
447+
If you see rejected packets, confirm that the IP tables aren't blocking the connections.
448448
449-
To confirm that packets are not being rejected, run:
449+
To confirm that packets aren't being rejected, run:
450450
451451
```config
452452
watch -n 2 -d iptables -nvL
@@ -577,7 +577,7 @@ This procedure describes how to verify whether a firewall policy is blocking the
577577
578578
# [CEF](#tab/cef)
579579
580-
If the steps described earlier in this article do not solve your issue, you may have a connectivity problem between the OMS Agent and the Microsoft Sentinel workspace.
580+
If the steps described earlier in this article don't solve your issue, you may have a connectivity problem between the OMS Agent and the Microsoft Sentinel workspace.
581581
582582
In such cases, continue troubleshooting by verifying the following:
583583
@@ -604,7 +604,7 @@ A log entry is returned if the agent is communicating successfully. Otherwise, t
604604
605605
# [Syslog](#tab/syslog)
606606
607-
If the steps described earlier in this article do not solve your issue, you may have a connectivity problem between the OMS Agent and the Microsoft Sentinel workspace.
607+
If the steps described earlier in this article don't solve your issue, you may have a connectivity problem between the OMS Agent and the Microsoft Sentinel workspace.
608608
609609
In such cases, continue troubleshooting by verifying the following:
610610
@@ -634,7 +634,7 @@ A log entry is returned if the agent is communicating successfully. Otherwise, t
634634
635635
## Next steps
636636
637-
If the troubleshooting steps in this article have not helped your issue, open a support ticket or use the Microsoft Sentinel community resources. For more information, see [Useful resources for working with Microsoft Sentinel](resources.md).
637+
If the troubleshooting steps in this article haven't helped your issue, open a support ticket or use the Microsoft Sentinel community resources. For more information, see [Useful resources for working with Microsoft Sentinel](resources.md).
638638
639639
To learn more about Microsoft Sentinel, see the following articles:
640640

0 commit comments

Comments
 (0)