Contents Menu Expand Light mode Dark mode Auto light/dark mode
MonitorWare Agent 15.1 documentation
MonitorWare Agent 15.1 documentation
  • Getting Started
    • Introduction
    • Understand the Components
    • Collect and Monitor Data
    • Creating an Initial Configuration
    • Process and Filter
    • Store and Forward
    • Operate and Troubleshoot
  • Tutorials
    • Tutorial: Enter License Information
    • Tutorial: Prepare MonitorWare Agent Data for Adiscon LogAnalyzer
    • Tutorial: Export Configuration and Create a Debug Log
    • Tutorial: Forward Events via Syslog
    • Tutorial: Forward Events via SETP
    • Tutorial: Forward Events via TLS to rsyslog
    • Tutorial: Write Events to a File
    • Tutorial: Store Data in the Default Database Schema
    • Tutorial: Integrate MonitorWare Agent with a Custom Database Schema
    • Tutorial: Configure Event Log Monitor V2
    • Tutorial: Configure a Syslog Server Service
  • InterActive SyslogViewer
    • InterActive SyslogViewer
    • Options & Configuration
      • Launching InterActive SyslogViewer
      • Using InterActive SyslogViewer
      • Options & Menus
        • File Menu
          • General Options
          • Notifications & Questions Tab
          • License Tab
        • Edit Menu
        • View Menu
        • Help Menu
      • Live Syslog View
      • Database View
    • FAQ
      • How to Autostart Interactive Syslog Viewer
  • Configuration
    • Client Options
    • Client Tools
    • Using File based configuration
    • General Options
      • License
      • General
      • Debug
      • Engine
      • Queue Manager
    • Services
      • Heartbeat
      • MonitorWare Echo Reply
      • MonitorWare Echo Request
      • Passive Syslog Listener
      • RELP Listener
      • SETP Server
      • SMTP Listener
      • SNMP Monitor
      • SNMP Trap Receiver
      • Syslog server
      • FTP Probe
      • HTTP Probe
      • IMAP Probe
      • NNTP Probe
      • Ping Probe
      • POP3 Probe
      • Port Probe
      • SMTP Probe
      • CPU/Memory Monitor
      • Diskspace Monitor
      • Event Log Monitor V1
      • Event Log Monitor V2
      • File Monitor
      • NT Service Monitor
      • Database Monitor
      • Serialport Monitor
    • Filter Conditions
      • Global Conditions
      • Date Conditions
      • Operators
      • Filters
        • REGEX Compare Operation
      • General
      • Date/Time
      • InformationUnit Type
      • Syslog
      • SNMP Traps
      • FTP Probe
      • HTTP Probe
      • IMAP Probe
      • NNTP Probe
      • POP3 Probe
      • SMTP Probe
      • Event Log Monitor
      • Event Log Monitor V2
      • File Monitor
      • NT Service Monitor
      • Disk Space Monitor
      • SerialPort Monitor
      • CPU / Memory Monitor
      • Custom Property
      • Extended Number Property
      • Extended IP Property
      • File Exists
      • Store Filter Results
    • Actions
      • ODBC Database Options
      • OLEDB Database Action
      • File Logging Options
      • Syslog Queue Action
      • Event Log Options
      • Send Email
      • Net Send
      • Send to Communications Port
      • Send MSQueue
      • Send RELP
      • Send SETP
      • Send SNMP Trap
      • Syslog Forwarding
      • Send DTLS
      • Call RuleSet
      • Compute Status Variable
      • Discard
      • Normalize Event
      • Post Processing
      • Parsing log messages
      • Resolve Hostname Action
      • Set Property
      • Set Status
      • Control NT Service
      • HTTP Request
      • Play Sound
      • Start Program
    • Core concepts
      • Services
      • Information Units
      • Filter Conditions
      • Actions
      • Rules
      • The Rule Engine
      • SETP
  • Licensing and purchasing
    • How do I contact Adiscon sales?
    • What should I include in a quote request?
    • What happens after I open a sales ticket?
    • How do purchase orders and billing requests work?
    • Licensing and ordering
    • Air-gapped environments
    • Offline installation and activation
    • Online verification after activation
    • Perpetual licenses and UpgradeInsurance
    • UpgradeInsurance
  • FAQ
    • How Do I Enter MonitorWare Agent License Information?
    • How Do I Get a Printable MonitorWare Agent Manual?
    • How Do I Perform a Mass Rollout Deployment?
    • How Do I Perform a Mass Update Rollout?
    • Differences Between Mass Rollout and Mass Update Rollout
    • Running MonitorWare Agent on a Windows Cluster Server
    • Which Database Format Should I Use with MonitorWare Agent?
    • How Do I Export Settings and Debug Data for a Support Case?
    • How Do Default Time Values Work?
    • Troubleshooting the Start Program action in MonitorWare Agent
    • Configuration reload issues under high load in MonitorWare Agent
    • Why are Logfiles sometimes not rotated in MonitorWare Agent 14.5 to 15.1?
    • Log Rotation Naming Convention Change in MonitorWare Agent 15.x
    • Why does log rotation fail when using ZIP compression in MonitorWare Agent?
    • Queue Buildup During SQL Server Table Cleanup Operations in MonitorWare Agent
    • Recommended Service Stop Order for MonitorWare Agent Maintenance
    • Are MonitorWare Agent products affected by recent OpenSSL CVEs?
    • Is MonitorWare Agent v15+ supported on Windows Server IoT 2025?
    • Why do log files remain locked when multiple rules write to the same file?
    • How to resolve performance issues on high-load systems?
    • Is MariaDB supported by the ODBC action?
    • Recommended Palo Alto Firewall Syslog Configuration
    • What do CA PEM, Certificate PEM, and Key PEM mean for TLS listeners?
    • Do the configuration clients require .NET Framework, or is .NET Core or .NET 5+ enough?
  • Reference
    • Command Line Switches
    • Shortcut Keys
    • Comparison of properties
    • Event Properties
      • Accessing Properties
        • Property
        • FromPos
        • ToPos
        • Options
        • Simple Examples
      • System Properties
      • Custom Properties
      • Event-Specific Properties
        • Standard Properties
        • Windows Event Log Properties
        • Windows Event Log V2 Properties
        • Syslog Message Properties
        • Disk Space Monitor
        • CPU/Memory Monitor
        • File Monitor
        • Windows Service Monitor
        • Ping Probe
        • Port Probe
        • Database Monitor
        • Serial Monitor
        • MonitorWare Echo Request
        • FTP Probe
        • IMAP Probe
        • NNTP Probe
        • SMTP Probe
        • POP3 Probe
        • HTTP Probe
    • Complex Filter Conditions
    • Custom Properties
    • Property
    • System Properties
    • Glossary
      • Database
      • Engine Only Install
      • IETF
      • IPv6
      • Registry File
      • RELP
      • Repository
      • RFC 3164
      • RFC 3195
      • RFC 5424
      • SETP
      • SMTP
      • SNMP
      • Syslog
      • TCP
      • UDP
      • UTC
  • Copyrights
Back to top

Recommended Palo Alto Firewall Syslog Configuration#

This article provides configuration recommendations for Palo Alto firewalls to ensure consistent and reliable syslog message parsing by your syslog server.

Question#

What is the recommended syslog format configuration for Palo Alto firewalls when sending logs to a syslog server?

Answer#

We recommend configuring Palo Alto firewalls to use IETF RFC 5424 syslog format instead of BSD

RFC 3164

format. The IETF format provides a structured, unambiguous message format that ensures consistent parsing regardless of Palo Alto firmware version or spacing differences in log messages.

Why Use IETF (RFC 5424) Format?#

IETF format is recommended over BSD

RFC 3164

format for the following reasons:

  1. Structured format: IETF format includes a required APP-NAME field that eliminates parsing ambiguity

  2. Consistent parsing: The structured format ensures your syslog server parses messages consistently regardless of: * Palo Alto firmware version * Spacing differences in log messages * Future firmware updates that may change message formatting

  3. Better compatibility: IETF format is the modern syslog standard and provides better support for SIEM systems and log analysis tools

  4. Prevents parsing issues: BSD format relies on heuristics that can be affected by spacing changes, potentially causing fields like version= to be parsed incorrectly or missing from output

Note: If you’re experiencing issues where the version= field is missing from syslog output after a Palo Alto upgrade, this is typically caused by BSD format parsing ambiguity due to spacing changes. Switching to IETF format resolves this issue.

Configuration Steps#

Step 1: Access Syslog Server Profile#

  1. Log in to the Palo Alto Networks firewall web interface

  2. Navigate to: Device > Server Profiles > Syslog

    Reference: Palo Alto Documentation - Configure Syslog Monitoring

  3. Either: * Edit an existing syslog server profile, or * Click Add to create a new profile

Step 2: Configure Syslog Server Settings#

For each syslog server in the profile:

  1. Name: Enter a unique name for the server (if creating new)

  2. Syslog Server: Enter the IP address or FQDN of your syslog server

  3. Transport: * Important: IETF format typically uses TCP or SSL (TLS) * Select TCP or SSL (not UDP) * If using SSL, ensure TLSv1.2 is supported

    Reference: Palo Alto Documentation - Configure Syslog Monitoring

  4. Port: Enter the port number (default TCP syslog port is 514, but verify with your syslog server configuration)

  5. Format: Select IETF (this is the key setting)

    Reference: Palo Alto Documentation - Configure Syslog Monitoring

  6. Facility: Select the appropriate syslog facility value (default is LOG_USER)

Step 3: Verify The Syslog Service Supports RFC 5424#

Before applying the changes, ensure:

  1. The Syslog Service supports RFC 5424 format: Verify that RFC 5424 parsing is enabled

Ensure RFC 5424 parsing is enabled in the Syslog Server service configuration.

Step 4: Commit Configuration#

  1. Click OK to save the syslog server profile

  2. Commit the configuration

  3. Review the commit and click Commit again to confirm

    Reference: Palo Alto Documentation - Configure Syslog Monitoring

Step 5: Verify Configuration#

After committing:

  1. Check syslog messages on your syslog server

  2. Verify the format: Messages should now appear in IETF format:

    <14>1 2025-10-30T13:13:04.000Z e26secgw02 paloalto - - [meta version="11.2.6"] version=11.2.6|subtype=general|...

  3. Verify APP-NAME field: The paloalto field (APP-NAME) should be present and consistently parsed by your syslog server

  4. Verify output format: Syslog server output should now consistently include the version= prefix

Expected Results#

After configuring IETF format, you should see:

  • Consistent message format: Messages appear in structured IETF format with the APP-NAME field (paloalto) consistently parsed

  • Reliable field extraction: All fields, including version=, are reliably extracted regardless of Palo Alto firmware version

  • Future-proof configuration: The structured format ensures consistent behavior even after firmware upgrades

  • Better log analysis: The structured format provides better support for SIEM systems and log analysis tools

Benefits Summary#

Using IETF (RFC 5424) format provides:

  • Eliminates parsing ambiguity: The structured format with required APP-NAME field ensures consistent parsing

  • Prevents version-related issues: Spacing changes in firmware updates won’t affect message parsing

  • Industry standard: IETF format is the modern syslog standard recommended for enterprise environments

  • Better integration: Improved compatibility with SIEM systems, log analysis tools, and centralized logging solutions

Technical Reference#

  • RFC 3164 (BSD)

  • RFC 5424 (IETF)

  • Palo Alto Documentation - Configure Syslog Monitoring

  • Palo Alto Documentation - Syslog Field Descriptions

  • Palo Alto Documentation - Use Syslog for Monitoring

Additional Information#

For more information about syslog server configuration and RFC 5424 support, see the Syslog Server documentation in your product’s manual.

Next
What do CA PEM, Certificate PEM, and Key PEM mean for TLS listeners?
Previous
Is MariaDB supported by the ODBC action?
Copyright © 2001-2026, Adiscon GmbH
Made with Sphinx and @pradyunsg's Furo
On this page
  • Recommended Palo Alto Firewall Syslog Configuration
    • Question
    • Answer
    • Why Use IETF (RFC 5424) Format?
    • Configuration Steps
      • Step 1: Access Syslog Server Profile
      • Step 2: Configure Syslog Server Settings
      • Step 3: Verify The Syslog Service Supports RFC 5424
      • Step 4: Commit Configuration
      • Step 5: Verify Configuration
    • Expected Results
    • Benefits Summary
    • Technical Reference
    • Additional Information