Skip to main content

Ingest Linux OS Syslog Data into Cloud SIEM

To ingest Linux OS data into Cloud SIEM:

  1. Configure a Syslog source on a collector. When you configure the source, do the following:
    1. Click the +Add Field link, and add a field whose name is _siemForward and value is true. This will ensure all logs for this source are forwarded to Cloud SIEM.
    2. Add another field named _parser with value /Parsers/System/Linux/Linux OS Syslog. This ensures that the Linux OS logs are parsed and normalized into structured records in Cloud SIEM.
  2. Configure forwarding for the Linux OS to the the syslog source. See Configure forwarding to a Syslog Source.
  3. To verify that your logs are successfully making it into Cloud SIEM:
    1. Classic UI. In the top menu select Configuration, and then under Incoming Data select Log Mappings.
      New UI. In the top menu select Configuration, and then under Cloud SIEM Integrations select Log Mappings. You can also click the Go To... menu at the top of the screen and select Log Mappings.
    2. On the Log Mappings tab search for "Linux OS" and check the Records columns. A list of mappers for Linux OS Syslog will appear and you can see if logs are coming in.
    3. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Linux OS security records:
      _index=sec_record* and metadata_product = "Linux OS Syslog"
Status
Legal
Privacy Statement
Terms of Use

Copyright © 2025 by Sumo Logic, Inc.