Ingest Nginx Access Logs into Cloud SIEM
To ingest Nginx Access Logs into Cloud SIEM:
- Configure a Syslog source on a collector. When you configure the source, do the following:
- Click the +Add Field link, and add a field whose name is
_siemForward
and value is true. This will ensure all logs for this source are forwarded to Cloud SIEM. - Add another field named
_parser
with value /Parsers/System/Nginx/Nginx Syslog. This ensures that the Nginx Access Logs are parsed and normalized into structured records in Cloud SIEM.noteThe Sumo Logic parser for Nginx Access Log messages supports the default “combined” format defined in
/etc/nginx/nginx.conf
and will allow additional information to be appended to that format without causing parsing to fail. Note that appended fields in a custom format will not be parsed without local configurations being applied. Other than appended fields that have local configurations applied, changes you make to the default format itself are not supported by the Sumo Logic parser.
- Click the +Add Field link, and add a field whose name is
- Follow the Nginx instructions for configuring the access log. See Configure forwarding to a Syslog Source for general instructions to configure forwarding to a syslog source.
- To verify that your logs are successfully making it into Cloud SIEM:
- Classic UI. In the top menu select Configuration, and then under Incoming Data select Log Mappings.
New UI. In the top menu select Configuration, and then under Cloud SIEM Integrations select Log Mappings. You can also click the Go To... menu at the top of the screen and select Log Mappings. - On the Log Mappings tab search for "Nginx" and check the Records columns. A list of mappers for Nginx will appear and you can see if logs are coming in.
- For a more granular look at the incoming records, you can also search the Sumo Logic platform for Nginx security records:
_index=sec_record* and metadata_product = "Nginx"
- Classic UI. In the top menu select Configuration, and then under Incoming Data select Log Mappings.