Syslog Connector

Configure the Syslog connector to receive system logs, network device events, and application messages via RFC 3164 and RFC 5424 protocols for AI-powered analysis.

Overview

The Syslog connector receives log messages from network devices, servers, applications, and infrastructure components using the industry-standard Syslog protocol. Syslog is the ubiquitous protocol for transmitting log messages across IP networks, supporting both RFC 3164 (BSD Syslog) and RFC 5424 (Structured Syslog) formats. Content streams into Edge Delta Pipelines for analysis by AI teammates through the Edge Delta MCP connector.

The connector supports TCP and UDP transports, TLS encryption for secure transmission, RFC 6587 framing for reliable TCP delivery, and automatic parsing of facility, severity, timestamps, and structured data. Edge Delta acts as a centralized Syslog server, extracting metadata including source IP, facility/severity levels, hostnames, and structured data elements.

When you add this streaming connector, it appears as a Syslog source in your selected pipeline. AI teammates access this data by querying the Edge Delta backend with the Edge Delta MCP connector.

For comprehensive Syslog configuration details, protocol specifications, and advanced features, see the Syslog Source documentation.

Add the Syslog Connector

To add the Syslog connector, you configure Edge Delta to listen for incoming Syslog messages on a specified port and protocol.

Prerequisites

Before configuring the connector, ensure you have:

  • Edge Delta agent with network access to receive inbound connections
  • Firewall rules allowing inbound Syslog traffic on chosen port (514, 1514, or 6514)
  • Source devices (network equipment, servers, applications) ready to forward Syslog
  • For ports below 1024, root/admin privileges (or use ports 1024+)

Configuration Steps

  1. Navigate to AI Team > Connectors in the Edge Delta application
  2. Find the Syslog connector in Streaming Connectors
  3. Click the connector card
  4. Select Protocol (RFC 3164 or RFC 5424)
  5. Select Transport Protocol (TCP or UDP)
  6. Configure Port (514 standard, 1514 non-privileged, 6514 TLS)
  7. Configure Listen Address (default 0.0.0.0)
  8. Optionally configure Advanced Settings for TLS, multiline, encoding
  9. Select a target environment
  10. Click Save

The connector deploys and begins listening for Syslog messages.

Syslog connector configuration showing protocol, transport, and advanced settings

Configuration Options

Connector Name

Name to identify this Syslog connector instance.

Protocol

Syslog protocol format for parsing messages.

Values:

  • RFC 3164 - Traditional BSD Syslog (legacy devices, maximum compatibility)
  • RFC 5424 - Structured Syslog (modern devices, enhanced metadata, structured data)

Default: RFC 5424

When to Use:

  • RFC 5424: Recommended for new deployments, modern appliances, devices supporting structured data
  • RFC 3164: Legacy devices, maximum compatibility, older network equipment

Transport Protocol

Transport protocol for receiving Syslog messages.

Values:

  • TCP - Reliable, connection-oriented delivery with guaranteed ordering
  • UDP - Connectionless, low-latency delivery without guarantees

Default: TCP

When to Use:

  • TCP: Production environments, critical logs, security events, financial transactions
  • UDP: High-volume scenarios, acceptable message loss, reduced overhead

Port

Port number to listen on for Syslog messages.

Format: Integer between 1 and 65535

Default: 514

Examples:

  • 514 - Standard Syslog port (requires root/admin privileges)
  • 1514 - Common non-privileged alternative
  • 6514 - Standard TLS-encrypted Syslog port

Note: Ports below 1024 require elevated privileges on Linux/Unix systems

Listen Address

IP address to listen on for incoming connections.

Format: IPv4 address

Default: 0.0.0.0 (all interfaces)

Examples:

  • 0.0.0.0 - Listen on all network interfaces
  • 192.168.1.100 - Listen only on specific interface
  • 10.0.0.50 - Bind to particular IP address

Advanced Settings

Timezone Location

Geographic location (timezone) for timestamp parsing. Used with RFC 3164 only (RFC 5424 uses ISO 8601 with explicit timezone).

Format: IANA timezone identifier

Default: UTC

Examples:

  • UTC - Coordinated Universal Time
  • America/New_York - Eastern Time (US)
  • Europe/London - British Time
  • Asia/Tokyo - Japan Standard Time

When to Use: RFC 3164 messages without timezone information need explicit timezone for correct timestamp parsing

Max Log Size

Maximum size of a single log entry to prevent excessive memory usage.

Format: Size with unit (KiB, MiB, GiB)

Default: 1MiB

Examples:

  • 512KiB - For typical log messages
  • 1MiB - Standard default
  • 5MiB - For logs with large stack traces or JSON payloads

When to Use: Increase for logs containing large stack traces, verbose JSON, or base64-encoded data

Add Network Attributes

Add network-related attributes according to OpenTelemetry semantic conventions (net.* attributes).

Includes:

  • net.peer.ip - Source IP address
  • net.peer.port - Source port
  • net.host.ip - Destination IP
  • net.host.port - Destination port

When to Use: Enable for network security analysis, IP-based filtering, or troubleshooting connection issues

Encoding

Character encoding of incoming messages.

Values: utf-8, utf-16, ascii, iso-8859-1, windows-1252

Default: utf-8

When to Use: Change for devices using non-UTF-8 encoding (legacy systems, specific regional devices)

Preserve Leading Whitespaces

Whether to preserve leading whitespace characters in log messages.

Default: false (trim leading whitespace)

When to Use: Enable when whitespace is semantically meaningful (formatted output, column alignment)

Preserve Trailing Whitespaces

Whether to preserve trailing whitespace characters in log messages.

Default: false (trim trailing whitespace)

When to Use: Enable when whitespace is semantically meaningful (rarely needed)

TLS Configuration

TLS configuration for secure TCP connections. Only supported for TCP transport.

Fields:

  • Certificate File: Path to TLS certificate file for secure connections
  • Private Key File: Path to TLS private key file
  • CA Certificate File: Path to CA certificate to verify client certificates
  • Client CA File: Path to CA for client certificate verification (enables mutual TLS)

When to Use: Enable for sensitive logs (security events, PII, credentials), transmission over untrusted networks, compliance requirements (HIPAA, PCI-DSS, GDPR)

Port Recommendation: Use port 6514 for TLS-encrypted Syslog (standard)

Multiline Configuration

Configuration for handling multiline log entries (stack traces, multi-line events).

When to Use: Enable when devices send logs spanning multiple lines (Java stack traces, multi-line application logs)

Details: See Syslog Source multiline configuration for line continuation patterns

Async Configuration

Configure concurrent processing of UDP messages.

Fields:

  • Readers: Number of concurrent goroutines reading from UDP port
  • Processors: Number of concurrent goroutines processing log messages
  • Max Queue Length: Maximum number of messages waiting for processing

When to Use: UDP transport only. Increase for high-volume UDP Syslog to improve throughput

Default: 1 reader, 1 processor

Enable Octet Counting

Enable RFC 6587 Octet Counting framing for TCP with RFC 5424.

Format: Message prefixed with byte length (e.g., 143 <34>1 2025-10-06...)

When to Use: Required for FortiGate firewalls in “reliable” mode, enterprise devices using octet counting

Note: Incompatible with allow_skip_pri_header. Only TCP + RFC 5424.

Details: See RFC 6587 Framing Support for complete configuration

Max Octets

Maximum octets for messages using RFC 6587 Octet Counting. Only applies when enable_octet_counting is true.

Format: Integer

Default: 8192

When to Use: Increase for devices sending large Syslog messages with octet counting

Allow Skip PRI Header

Allow parsing records without PRI header (priority field).

Note: Requires enable_octet_counting to be false. Incompatible with octet counting.

When to Use: Some non-standard Syslog implementations omit PRI header

Non-Transparent Framing Trailer

Framing trailer for RFC 6587 Non-Transparent-Framing. Only TCP + RFC 5424.

Values: LF (newline), NUL (null byte)

Default: LF

When to Use: Alternative to octet counting for message framing

Details: See RFC 6587 Framing Support for complete configuration

Metadata Level (Resource Attributes)

This option is used to define which detected resources and attributes to add to each data item as it is ingested by Edge Delta. You can select:

  • Required Only: This option includes the minimum required resources and attributes for Edge Delta to operate.
  • Default: This option includes the required resources and attributes plus those selected by Edge Delta
  • High: This option includes the required resources and attributes along with a larger selection of common optional fields.
  • Custom: With this option selected, you can choose which attributes and resources to include. The required fields are selected by default and can’t be unchecked.

Based on your selection in the GUI, the source_metadata YAML is populated as two dictionaries (resource_attributes and attributes) with Boolean values.

See Choose Data Item Metadata for more information on selecting metadata.

Syslog-specific metadata included:

  • Host name - Edge Delta agent hostname
  • Host IP - Edge Delta agent IP address
  • Service name - Service identifier
  • Source name - Connector instance name
  • Source type - Syslog connector type

Syslog metadata extracted from messages:

  • Priority - Numeric priority value (facility * 8 + severity)
  • Facility - Facility code (0-23) indicating source type
  • Severity - Severity level mapped from priority
  • Hostname - Source system hostname
  • App name - Application or process name
  • Process ID - Process identifier
  • Message ID - Message identifier (RFC 5424 only)
  • Structured data - Key-value pairs (RFC 5424 only)
  • Timestamp - Parsed timestamp from Syslog message

Severity Mapping:

PrioritySeverityDescription
0emergencySystem unusable
1alertAction required immediately
2criticalCritical conditions
3errorError conditions
4warningWarning conditions
5noticeNormal but significant
6infoInformational
7debugDebug-level

Metadata Level (Attributes)

Additional attribute-level metadata fields to include.

Default: ed.env.id

How to Use the Syslog Connector

The Syslog connector integrates seamlessly with AI Team, enabling data ingestion from Syslog-enabled infrastructure. AI teammates automatically leverage Syslog data to monitor network device health, investigate security events, analyze firewall logs, track authentication failures, and detect infrastructure anomalies.

Use Case: Network Device Monitoring

Monitor routers, switches, and load balancers via Syslog for interface failures, configuration changes, and performance issues. AI teammates analyze device logs to identify network problems, detect unusual traffic patterns, and track configuration changes. This is valuable for network operations teams troubleshooting connectivity issues and ensuring network stability.

Configuration:

  • Protocol: RFC 3164
  • Transport Protocol: UDP
  • Port: 514
  • Listen Address: 0.0.0.0

Device Configuration (Cisco):

logging host 10.0.0.100
logging trap informational
logging facility local7

For detailed device configuration examples, see Network Device Configuration in the Syslog Source documentation.

Use Case: Firewall Security Analysis

Analyze firewall logs from FortiGate, Palo Alto, or Cisco ASA for security threats and policy violations. AI teammates detect blocked attacks, identify suspicious connection patterns, and track security rule hits. Using RFC 5424 with structured data provides rich metadata for detailed security analysis.

Configuration:

  • Protocol: RFC 5424
  • Transport Protocol: TCP
  • Port: 6514
  • Listen Address: 0.0.0.0
  • TLS Configuration: Enabled
  • Enable Octet Counting: true (FortiGate reliable mode)

Device Configuration (FortiGate):

config log syslogd setting
    set status enable
    set server "10.0.0.100"
    set port 6514
    set mode reliable
    set facility local7
    set format rfc5424
end

For detailed firewall configuration examples including FortiGate, Palo Alto Networks, and Cisco ASA, see the Syslog Source documentation.

Use Case: Linux Server Log Aggregation

Centralize system logs from Linux servers for security monitoring and troubleshooting. AI teammates analyze authentication events, detect failed login attempts, monitor service failures, and track system errors across infrastructure. This enables unified visibility across distributed server environments.

Configuration:

  • Protocol: RFC 5424
  • Transport Protocol: TCP
  • Port: 1514
  • Listen Address: 0.0.0.0
  • Timezone Location: UTC

Server Configuration (rsyslog):

*.* @@10.0.0.100:1514

Troubleshooting

Messages not received: Verify Edge Delta listening on port with netstat -uln | grep 514 (UDP) or netstat -tln | grep 514 (TCP). Test connectivity from source device with logger -n edge-delta-host -P 514 "test message". Check firewall rules allow inbound traffic on configured port. Verify source device Syslog configuration points to correct Edge Delta IP and port.

Timestamp parsing errors: For RFC 3164, verify timezone location matches source device timezone. RFC 3164 doesn’t include timezone in messages, requiring explicit configuration. For RFC 5424, timestamps include ISO 8601 timezone and parse automatically. Check device sends timestamps in expected format.

TCP connection failures with octet counting: Verify both protocol: RFC 5424 and transport: TCP configured. Octet counting only works with RFC 5424 over TCP. Check device configured for octet counting framing (FortiGate “reliable” mode). Ensure allow_skip_pri_header is false (incompatible with octet counting).

TLS handshake failures: Verify TLS only configured with TCP transport (not UDP). Check certificate and private key files exist and readable. Ensure certificate CN/SAN matches hostname devices connect to. Verify device configured for TLS Syslog (typically port 6514). Check client CA configured if using mutual TLS.

Messages truncated: Increase max_log_size for logs with large stack traces or JSON. Default 1MiB may be insufficient for verbose application logs. Monitor for truncation warnings in Edge Delta logs. Adjust device verbosity if messages consistently exceed limits.

High UDP packet loss: UDP doesn’t guarantee delivery. Enable async configuration to increase concurrent UDP processing (increase readers and processors). Consider switching to TCP for reliable delivery. Monitor Edge Delta resource usage (CPU, memory) as bottleneck indicator. Deploy multiple Edge Delta agents with load balancing.

Encoding issues with special characters: Verify encoding matches device character set. Default utf-8 works for most modern devices. Legacy devices may use iso-8859-1 or windows-1252. Check for mojibake (garbled characters) indicating encoding mismatch.

Multiline messages split incorrectly: Configure multiline settings to recognize line continuation patterns. See Syslog Source multiline configuration for pattern examples. Java stack traces and multi-line application logs require multiline support.

Next Steps

For additional help, visit AI Team Support.