IncidentResponsev2

4.09.2 Configure Security Onion Syslog Server

Task

Configure Security Onion to act as a Syslog server and ingest logs from external devices such as firewalls, switches, routers, and servers.


Conditions

Given an operational Security Onion deployment and external network devices capable of sending syslog events.


Standards


End State

Security Onion receives syslog messages from external sources and logs are searchable in Kibana for analysis.


Notes


Manual Steps

Step 1: Validate syslog-ng is running

Security Onion uses syslog-ng as its syslog receiver by default.

Check syslog-ng service status:

sudo so-status

You should see:

[+] syslog-ng................. running

If not running:

sudo so-sensor-restart

Step 2: Configure Firewall Access

By default, Security Onion blocks incoming syslog from external networks.

Allow specific networks or hosts to send syslog using so-allow:

sudo so-allow

Select Custom when prompted, and allow UDP/514 or TCP/514 from desired source IPs/subnets.

Example:

Allowed CIDR → 192.168.1.0/24
Protocol → UDP
Port → 514

Operator Note: Always restrict allowed networks — never leave open to entire Internet.


Step 3: Configure Source Devices

On each external device (e.g. Palo Alto Firewall, Cisco Switch, Linux Server):

Example (Linux server):

logger -n 192.168.1.10 -P 514 -d "Test syslog message to Security Onion"

Step 4: Validate Log Receipt

Logs sent to syslog-ng are stored locally before forwarding to Elastic stack.

Check raw syslog data:

sudo tail -f /nsm/sensor_logs/syslog-ng/syslog-ng.log

Operator Note: If logs do not appear → verify network connectivity, firewall rules, and source configuration.


Step 5: Validate Log Ingestion in Kibana

Example search:

message:"Test syslog message to Security Onion"

You should see your log displayed.

Operator Note: Timestamp and source IP should match sender → review parsing and timezone if discrepancies exist.


Dependencies


Other Available Tools

Tool Platform Installation Usage
syslog-ng Built-in (Security Onion) Native Syslog reception and processing
Kibana Web UI Native Searching and analyzing logs
logger (Linux) Built-in Generate test syslog events  

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Created from scratch with detailed operator guidance and configuration validation steps Leo