Skip to content

Custom Syslog Sources Integration

Overview

KYRA MDR supports any device or application that can send syslog messages. This guide covers configuring custom syslog sources for log collection, enabling security monitoring for proprietary systems and legacy devices.

Prerequisites

  • A KYRA MDR Collector installed and running
  • Device or application capable of sending syslog (RFC 3164 or RFC 5424)
  • Network connectivity from the source to the collector on port 514
  • Knowledge of the log format for parser configuration

Configuration

Configure any syslog-capable device:

SettingValue
Server/HostYour KYRA Collector IP
Port514 (or custom)
ProtocolTCP (recommended) or UDP
Facilitylocal0-local7
Severityinfo or higher

For file-based logging, use rsyslog:

/etc/rsyslog.d/custom-app.conf
module(load="imfile")
input(type="imfile"
File="/var/log/myapp/*.log"
Tag="myapp"
Facility="local3"
)
local3.* @@<collector-ip>:514

For custom parsing, contact KYRA MDR support with sample log lines.

Collected Log Types

Log TypeDescriptionSecurity Use
Application EventsCustom application log entriesApplication security
System EventsHost and service eventsInfrastructure monitoring
Security EventsAuthentication and access eventsAccess control monitoring
Error EventsError and exception logsIncident detection
Audit EventsAudit trail entriesCompliance monitoring
Custom EventsAny structured or unstructured logFlexible monitoring

Troubleshooting

Logs not received: Verify connectivity with telnet <collector-ip> 514.

Parsing failures: Custom formats require parser configuration. Send samples to kyra@seekerslab.com.

Timestamp issues: Ensure the source sends logs with timestamps for proper correlation.

Contact kyra@seekerslab.com for support.