Syslog Log Source Parameters for Raz-Lee i Security
If JSA does not automatically detect the log source, add a Raz-Lee i Security log source on the JSA Console by using the Syslog protocol.
When using the Syslog protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect Syslog events from Raz-Lee i Security:
Parameter |
Value |
---|---|
Log Source Name |
Type a name for your log source. |
Log Source Description |
Type a description for the log source. |
Log Source Type |
IBM i |
Protocol Configuration |
Syslog |
Log Source Identifier |
Type the IP address or host name for the log source as an identifier for events from your IBM i system with Raz- Lee iSecurity. |