Syslog Log Source Parameters for Raz-Lee iSecurity
If JSA does not automatically detect the log source, add a Raz-Lee iSecurity log source on the JSA Console by using the Syslog protocol.
When using the syslog protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect Syslog events from Raz-Lee iSecurity:
Parameter |
Value |
---|---|
Log Source type |
Raz-Lee iSecurity |
Protocol Configuration |
Syslog |
Log Source Identifier |
The IP address or host name of the log source that sends events from the Raz-Lee iSecurity device. |
Enabled |
By default, the check box is selected. |
Credibility |
The Credibility of the log source. The range is 0 - 10. The credibility indicates the integrity of an event or offense as determined by the credibility rating from the source devices. Credibility increases if multiple sources report the same event. The default is 5. |
Coalescing Events |
By default, automatically discovered log sources inherit the value of the Coalescing Events list from the System Settings in JSA. When you create a log source or edit an existing configuration, you can override the default value by configuring this option for each log source. |
Incoming Payload Encoding |
Select Incoming Payload Encoder for parsing and storing the logs. |
Store Event Payload |
By default, automatically discovered log sources inherit the value of the Store Event Payload list from the System Settings in JSA. When you create a log source or edit an existing configuration, you can override the default value by configuring this option for each log source. |