@Koushik A R Thank you for your time and patience over the call! Below is the summary of troubleshooting steps followed to resolve the issue.
Issue: Syslog/CEF via AMA Setup – Logs Reaching Syslog Server but Not Showing in Sentinel -Preventing an Ubuntu Linux Server (24.04.2 LTS) from sending Syslog data to Azure Monitor - Log Analytics Workspace / Sentinel.
Cause: The primary issues stemmed from misconfigurations in the local rsyslog service and Azure Monitor components.
Resolution/Corrective actions:
- Restoring critical rsyslog configurations: The /etc/rsyslog.conf file was updated to include $IncludeConfig /etc/rsyslog.d/*.conf, ensuring additional configurations, including the Azure Monitor Agent's (AMA) settings, were processed. Additionally, the missing /etc/rsyslog.d/50-default.conf file, crucial for default telemetry processing, was restored.
- Correcting Azure Data Collection Rule (DCR) and Updating Azure Monitor Agent: An unnecessary Data Collection Endpoint (DCE) was removed from the Syslog DCR. The Azure Monitor Agent Extension on the Linux server was updated to the latest version. Validation confirmed the Azure Arc Agent (azcmagent) was connected and communicating with Azure Monitor REST API Endpoints. The DCR was verified to have the correct facilities, severity levels, and the target Linux server assigned as a resource.
- Network and Service Validation: Network connectivity was confirmed by ensuring rsyslog was listening on TCP/UDP port 514 (netstat -peanutl) and that the imudp / imtcp modules were enabled in /etc/rsyslog.conf. Traffic analysis using tcpdump validated incoming Syslog data from client systems on network interface (enslp0) and outgoing telemetry to Azure Monitor via the local loopback interface on the hairpin port (28330).
These combined actions rectified the Syslog forwarding failures, enabling successful data ingestion into Azure Monitor.
If the response helped, do "Accept Answer" and up-vote it