Contents Menu Expand Light mode Dark mode Auto light/dark mode
WinSyslog 18.1 documentation
WinSyslog 18.1 documentation
  • Getting Started
    • Installation
    • Understand the Components
    • Receive Logs
    • Creating an Initial Configuration
    • Process and Filter
    • Store and Forward
    • Operate and Troubleshoot
  • Tutorials
    • Tutorial: Prepare WinSyslog Data for Adiscon LogAnalyzer
    • Tutorial: Create a Simple Syslog Server and Write to a File
    • Tutorial: Export the Configuration and Create a Debug Log
    • Tutorial: Configure a SETP Server Service
    • Tutorial: Forward Messages to Another Syslog Server
    • Tutorial: Send Matching Messages by Email
    • Tutorial: Write Messages to a Database
  • Interactive Syslog Viewer
    • InterActive SyslogViewer
    • Options & Configuration
      • Launching InterActive SyslogViewer
      • Using InterActive SyslogViewer
      • Options & Menus
        • File Menu
          • General Options
          • Notifications & Questions Tab
          • License Tab
        • Edit Menu
        • View Menu
        • Help Menu
      • Live Syslog View
      • Database View
    • FAQ
      • How to Autostart Interactive Syslog Viewer
  • Configuration
    • Core concepts
      • WinSyslog - Services
      • Information Units
      • Rules
      • The Rule Engine
      • Filter Conditions
      • Actions
    • Configuring WinSyslog
    • Organizing with RuleSets, Rules, and Actions
    • Client Options
    • Client Tools
    • Using File based configuration
    • General Options
      • License
      • General
      • Debug
      • Engine
      • Queue Manager
      • Permitted Senders
    • Services
      • Heartbeat
      • MonitorWare Echo Reply
      • RELP Listener
      • SETP Server
      • SNMP Trap Receiver
      • Syslog server
    • Filter conditions
      • Global Conditions
      • Date Conditions
      • Operators
      • Filters
        • REGEX Compare Operation
      • General
      • Date/Time
      • InformationUnit Type
      • Syslog
      • SNMP Traps
      • Event Log Monitor
      • Event Log Monitor V2
      • File Monitor
      • Custom Property
      • Extended Number Property
      • Extended IP Property
      • File Exists
      • Store Filter Results
    • Actions
      • ODBC Database Options
      • OLEDB Database Action
      • File Logging Options
      • Event Log Options
      • Send Email
      • Net Send
      • Send to Communications Port
      • Send MSQueue
      • Send RELP
      • Send SETP
      • Send SNMP Trap
      • Syslog Forwarding
      • Send DTLS
      • Call RuleSet
      • Compute Status Variable
      • Discard
      • Normalize Event
      • Post Processing
      • Parsing log messages
      • Resolve Hostname Action
      • Set Property
      • Set Status
      • Play Sound
      • Start Program
  • FAQ
    • Why are Logfiles sometimes not rotated in WinSyslog 17.5 or lower?
    • Log Rotation Naming Convention Change in WinSyslog 18.x
    • Why does log rotation fail when using ZIP compression in WinSyslog?
    • Are WinSyslog products affected by recent OpenSSL CVEs?
    • Troubleshooting the Start Program action in WinSyslog
    • High-load configuration reload issues in WinSyslog
    • Queue Buildup During SQL Server Table Cleanup Operations in WinSyslog
    • Default Timevalues Setting in WinSyslog Explained
    • How to Export WinSyslog Settings for a Support Call
    • Recommended Service Stop Order for WinSyslog Maintenance
    • Running WinSyslog on a Windows Cluster Server
    • Why Does a WinSyslog Message Show Two Timestamps?
    • What Does WinSyslog Event ID 1011 Mean?
    • Why do log files remain locked when multiple rules write to the same file?
    • How to resolve performance issues on high-load systems?
    • Is MariaDB supported by the ODBC action?
    • Recommended Palo Alto Firewall Syslog Configuration
    • How to Perform a Mass Rollout of WinSyslog
    • How to Copy the WinSyslog Configuration to Other Servers
    • How Can I Obtain a Printable Version of the WinSyslog Manual?
    • Can WinSyslog Write to a UNC Path?
    • Which Database Format Should I Use with WinSyslog?
    • What do CA PEM, Certificate PEM, and Key PEM mean for TLS listeners?
    • Forwarding syslog messages with original IP address in WinSyslog
    • What Is the Difference Between SETP and Syslog?
    • How Do I Handle Non-Standard Syslog Messages from Unix or Linux Systems?
    • How Do I Enter WinSyslog License Information?
    • What is Freeware Mode?
    • WinSyslog vs Kiwi Syslog Server – Which to Choose?
    • Do the configuration clients require .NET Framework, or is .NET Core or .NET 5+ enough?
    • Is WinSyslog v18+ supported on Windows Server IoT 2025?
  • Licensing and purchasing
    • How do I contact Adiscon sales?
    • What should I include in a quote request?
    • What happens after I open a sales ticket?
    • How do purchase orders and billing requests work?
    • Licensing and ordering
    • Air-gapped environments
    • Offline installation and activation
    • Online verification after activation
    • Perpetual licenses and UpgradeInsurance
    • UpgradeInsurance
  • Reference
    • WinSyslog Shortcut Keys
    • Command Line Switches
    • Edition Comparison
    • Comparison of properties
    • Event Properties
      • Accessing Properties
        • Property
        • FromPos
        • ToPos
        • Options
        • Simple Examples
      • System Properties
      • Custom Properties
      • Event-Specific Properties
        • Standard Properties
        • Windows Event Log Properties
        • Windows Event Log V2 Properties
        • Syslog Message Properties
        • Disk Space Monitor
        • CPU/Memory Monitor
        • File Monitor
        • Windows Service Monitor
        • Ping Probe
        • Port Probe
        • Database Monitor
        • Serial Monitor
        • MonitorWare Echo Request
        • FTP Probe
        • IMAP Probe
        • NNTP Probe
        • SMTP Probe
        • POP3 Probe
        • HTTP Probe
    • Complex Filter Conditions
    • Connect to Computer
    • Registry Paths
    • System Error Codes
    • Glossary
      • Engine Only Install
      • FTP
      • HTTP
      • IETF
      • IMAP
      • IPv6
      • Millisecond
      • NNTP
      • POP3
      • Registry File
      • RELP
      • Resource ID
      • RFC 3164
      • RFC 3195
      • RFC 5424
      • SETP
      • SMTP
      • SNMP
      • Syslog Facility
      • TCP
      • UDP
      • UTC
  • Copyrights
Back to top

Recommended Palo Alto Firewall Syslog Configuration#

This article provides configuration recommendations for Palo Alto firewalls to ensure consistent and reliable syslog message parsing by your syslog server.

Question#

What is the recommended syslog format configuration for Palo Alto firewalls when sending logs to a syslog server?

Answer#

We recommend configuring Palo Alto firewalls to use IETF RFC 5424 syslog format instead of BSD

RFC 3164

format. The IETF format provides a structured, unambiguous message format that ensures consistent parsing regardless of Palo Alto firmware version or spacing differences in log messages.

Why Use IETF (RFC 5424) Format?#

IETF format is recommended over BSD

RFC 3164

format for the following reasons:

  1. Structured format: IETF format includes a required APP-NAME field that eliminates parsing ambiguity

  2. Consistent parsing: The structured format ensures your syslog server parses messages consistently regardless of: * Palo Alto firmware version * Spacing differences in log messages * Future firmware updates that may change message formatting

  3. Better compatibility: IETF format is the modern syslog standard and provides better support for SIEM systems and log analysis tools

  4. Prevents parsing issues: BSD format relies on heuristics that can be affected by spacing changes, potentially causing fields like version= to be parsed incorrectly or missing from output

Note: If you’re experiencing issues where the version= field is missing from syslog output after a Palo Alto upgrade, this is typically caused by BSD format parsing ambiguity due to spacing changes. Switching to IETF format resolves this issue.

Configuration Steps#

Step 1: Access Syslog Server Profile#

  1. Log in to the Palo Alto Networks firewall web interface

  2. Navigate to: Device > Server Profiles > Syslog

    Reference: Palo Alto Documentation - Configure Syslog Monitoring

  3. Either: * Edit an existing syslog server profile, or * Click Add to create a new profile

Step 2: Configure Syslog Server Settings#

For each syslog server in the profile:

  1. Name: Enter a unique name for the server (if creating new)

  2. Syslog Server: Enter the IP address or FQDN of your syslog server

  3. Transport: * Important: IETF format typically uses TCP or SSL (TLS) * Select TCP or SSL (not UDP) * If using SSL, ensure TLSv1.2 is supported

    Reference: Palo Alto Documentation - Configure Syslog Monitoring

  4. Port: Enter the port number (default TCP syslog port is 514, but verify with your syslog server configuration)

  5. Format: Select IETF (this is the key setting)

    Reference: Palo Alto Documentation - Configure Syslog Monitoring

  6. Facility: Select the appropriate syslog facility value (default is LOG_USER)

Step 3: Verify The Syslog Service Supports RFC 5424#

Before applying the changes, ensure:

  1. The Syslog Service supports RFC 5424 format: Verify that RFC 5424 parsing is enabled

Ensure RFC 5424 parsing is enabled in the Syslog Server service configuration.

Step 4: Commit Configuration#

  1. Click OK to save the syslog server profile

  2. Commit the configuration

  3. Review the commit and click Commit again to confirm

    Reference: Palo Alto Documentation - Configure Syslog Monitoring

Step 5: Verify Configuration#

After committing:

  1. Check syslog messages on your syslog server

  2. Verify the format: Messages should now appear in IETF format:

    <14>1 2025-10-30T13:13:04.000Z e26secgw02 paloalto - - [meta version="11.2.6"] version=11.2.6|subtype=general|...

  3. Verify APP-NAME field: The paloalto field (APP-NAME) should be present and consistently parsed by your syslog server

  4. Verify output format: Syslog server output should now consistently include the version= prefix

Expected Results#

After configuring IETF format, you should see:

  • Consistent message format: Messages appear in structured IETF format with the APP-NAME field (paloalto) consistently parsed

  • Reliable field extraction: All fields, including version=, are reliably extracted regardless of Palo Alto firmware version

  • Future-proof configuration: The structured format ensures consistent behavior even after firmware upgrades

  • Better log analysis: The structured format provides better support for SIEM systems and log analysis tools

Benefits Summary#

Using IETF (RFC 5424) format provides:

  • Eliminates parsing ambiguity: The structured format with required APP-NAME field ensures consistent parsing

  • Prevents version-related issues: Spacing changes in firmware updates won’t affect message parsing

  • Industry standard: IETF format is the modern syslog standard recommended for enterprise environments

  • Better integration: Improved compatibility with SIEM systems, log analysis tools, and centralized logging solutions

Technical Reference#

  • RFC 3164 (BSD)

  • RFC 5424 (IETF)

  • Palo Alto Documentation - Configure Syslog Monitoring

  • Palo Alto Documentation - Syslog Field Descriptions

  • Palo Alto Documentation - Use Syslog for Monitoring

Additional Information#

For more information about syslog server configuration and RFC 5424 support, see the Syslog Server documentation in your product’s manual.

Next
How to Perform a Mass Rollout of WinSyslog
Previous
Is MariaDB supported by the ODBC action?
Copyright © 1996-2026, Adiscon GmbH
Made with Sphinx and @pradyunsg's Furo
On this page
  • Recommended Palo Alto Firewall Syslog Configuration
    • Question
    • Answer
    • Why Use IETF (RFC 5424) Format?
    • Configuration Steps
      • Step 1: Access Syslog Server Profile
      • Step 2: Configure Syslog Server Settings
      • Step 3: Verify The Syslog Service Supports RFC 5424
      • Step 4: Commit Configuration
      • Step 5: Verify Configuration
    • Expected Results
    • Benefits Summary
    • Technical Reference
    • Additional Information