Sending Linux Logs to Qradar

Sending Linux Logs to IBM Qradar is a complex process for beginners . Its a process of collecting and forwarding Linux system logs to a Qradar SIEM platform. This enables centralized monitoring, analysis, and detection of security threats, compliance violations, and operational anomalies. By integrating Linux logs with Qradar, organizations can gain valuable insights into their IT infrastructure and enhance their overall security posture.

Introduction

IBM QRadar is a comprehensive security information and event management (SIEM) solution that helps organizations detect and respond to threats in real time. One of the essential tasks in setting up QRadar is configuring it to receive logs from your Linux systems. This guide will walk you through the process step by step.

Sending Linux Logs to QRadar

Prerequisites

  • QRadar installed and accessible.
  • A Linux server from which you want to send logs.
  • Administrative access to both the Linux server and QRadar.

Step 1: Configure QRadar to Receive Logs

  1. Log in to QRadar:

Access your QRadar instance through a web browser with your Qradar IP’s

Log in with administrative credentials

  1. Add a Log Source:

Navigate to the Admin tab. Under the “Data Sources” section, click on “Log Sources.”
OR
you can see direct option of log source so Click on the “Add” button to create a new log source

 

Add your New Log Source then Configure the log source details like single log sources or multiple log sources

In Log Source Type: Select the appropriate log source type (e.g., Linux OS). In Protocol Configuration: Choose “Syslog.”

In Log Source Name You can Provide a meaningful name for the log source. Then Paste you kali linux ip or your any Linux OS IP in log source Identifier then Click “Finish.”

Step 2: Install and Configure Rsyslog on Linux

  1. Install Rsyslog:

Most Linux distributions come with Rsyslog pre-installed. If not, you can install it using your package manager.

sudo apt-get install rsyslog   #Debian/Ubuntu
sudo yum install rsyslog #CentOS/RHEL
    1. Configure Rsyslog to Send Logs to QRadar:

    Edit the rsyslog configuration file (usually located at /etc/rsyslog.conf or /etc/rsyslog.d/50-default.conf).

    sudo nano /etc/rsyslog.conf

    Uncomment following lines

    Add the following lines at the end of the file to forward logs to QRadar. Replace qradar_ip with the IP address of your QRadar server.

    *.* @qradar_ip:514

    Press CTRL+X and then Press Y , Save and close the file

    1. Restart Rsyslog:

    Restart the Rsyslog service to apply the changes.

    sudo systemctl restart rsyslog
    Step 3: Verify Log Reception in QRadar
    1. Check QRadar Log Activity:

    Go to the “Log Activity” tab in the QRadar web interface.

       – Set the time range to display recent logs.

       – You should start seeing logs from your Linux server. Use filters to locate logs from your newly added log source

    Cross Verifying Log Delivery to QRadar (Optional)

    It’s crucial to ensure your Linux logs are reaching QRadar for effective security monitoring. Here, we’ll demonstrate how to verify log delivery and simulate log messages for testing.

    Simulating Log Messages

    We can use the logger command to send a test message to the system logs. This message will then be forwarded to QRadar if configured correctly. Here’s an example command that sends the message “hello there”:

    sudo logger ” hello thor “

    This will create a log entry that you can then look for in QRadar to confirm successful delivery.

    Now we can use the tcpdump command to capture network traffic on the Linux system. This can be helpful for troubleshooting specific connectivity issues. However, the focus for most users should be on using the logger command for basic verification.

    sudo tcpdump -nnAs0 -i eth0 host <localhostIP> and port 514

    We can see our local host successfully sent logs to Qradar