Configure Security Onion to act as a Syslog server and ingest logs from external devices such as firewalls, switches, routers, and servers.
Given an operational Security Onion deployment and external network devices capable of sending syslog events.
Security Onion receives syslog messages from external sources and logs are searchable in Kibana for analysis.
Security Onion uses syslog-ng as its syslog receiver by default.
Check syslog-ng service status:
sudo so-status
You should see:
[+] syslog-ng................. running
If not running:
sudo so-sensor-restart
By default, Security Onion blocks incoming syslog from external networks.
Allow specific networks or hosts to send syslog using so-allow
:
sudo so-allow
Select Custom when prompted, and allow UDP/514 or TCP/514 from desired source IPs/subnets.
Example:
Allowed CIDR → 192.168.1.0/24
Protocol → UDP
Port → 514
Operator Note: Always restrict allowed networks — never leave open to entire Internet.
On each external device (e.g. Palo Alto Firewall, Cisco Switch, Linux Server):
Example (Linux server):
logger -n 192.168.1.10 -P 514 -d "Test syslog message to Security Onion"
Logs sent to syslog-ng are stored locally before forwarding to Elastic stack.
Check raw syslog data:
sudo tail -f /nsm/sensor_logs/syslog-ng/syslog-ng.log
Operator Note: If logs do not appear → verify network connectivity, firewall rules, and source configuration.
logstash-*
or syslog-*
)Example search:
message:"Test syslog message to Security Onion"
You should see your log displayed.
Operator Note: Timestamp and source IP should match sender → review parsing and timezone if discrepancies exist.
Tool | Platform | Installation | Usage |
---|---|---|---|
syslog-ng | Built-in (Security Onion) | Native | Syslog reception and processing |
Kibana | Web UI | Native | Searching and analyzing logs |
logger (Linux) | Built-in | Generate test syslog events |
so-allow
for source IPs and port 514.so-allow
to ensure security posture.Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Created from scratch with detailed operator guidance and configuration validation steps | Leo |