Log Streams Overview
Log streaming supports forwarding of audit logs, session logs, and security events to an external Security Information and Event Management (SIEM) system, such as Microsoft Sentinel.
You can forward logs and events to Microsoft Sentinel or to Microsoft Sentinel-supported services such as Azure Logic App and Azure Log Collector. The data forwarded to SIEM systems is in JSON format.
Streaming logs from Juniper Security Director Cloud is a licensed feature.
To access the Log Streams page, click Administration > Log Streams.
Field Descriptions
The Deleted tab provides the same information as the Live tab, but specifically for deleted log streams.
|
Field |
Description |
|---|---|
|
Live |
|
|
Name |
The name of the log stream. |
|
Log Type |
The type of log to forward to an external SIEM system. |
|
Connection Type |
The type of the external SIEM system to which you can transfer the logs. |
|
Latest Status |
The current status of the logs forwarded to external SIEM systems. |
|
Bytes Sent this Month |
The total bytes forwarded to external SIEM systems in the current month. |
|
Last Failure Time |
The time when streaming logs to the external SIEM systems failed. |
|
Log Streaming |
Indicates whether log streaming is enabled. |