Syslog
Dashboard Location: Network-wide > Configure > General > Reporting
Syslog Server Management
Syslog server configuration in Meraki enables centralized logging and monitoring by forwarding network events, security logs, and operational data to external log management systems. Syslog integration supports comprehensive network visibility, compliance reporting, and security incident analysis through standardized log forwarding to SIEM platforms, log aggregators, and monitoring solutions. This functionality provides role-based log filtering, ensuring relevant events are sent to appropriate monitoring systems based on operational requirements.
Diagram
Classes
networks (meraki.domains.organizations)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
syslog_servers | List | [syslog_servers] | No |
syslog_servers (meraki.domains.organizations.networks)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
host | String | min: 1 , max: 127 | Yes | |
port | Integer | min: 0 , max: 65535 | Yes | |
roles | List | String[min: 1 , max: 127 ] | Yes |
Examples
Example-1: The example below demonstrates basic syslog configuration for a small office deployment with essential event logging to a central syslog server.
meraki: domains: - name: "!env domain" administrator: name: "!env org_admin" organizations: - name: "!env org" networks: - name: "!env network_name" product_types: - appliance - switch - wireless syslog_servers: servers: - host: "!env syslog_server_ip" port: 514 roles: - "Appliance event log" - "Switch event log" - "Wireless event log"