[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[[["\u003cp\u003eThis document details the process of collecting NetScaler logs for Google Security Operations using a forwarder, focusing on configuring both NetScaler VPX and SDX.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eCITRIX_NETSCALER\u003c/code\u003e ingestion label is used by the parser to normalize raw log data into a structured UDM format.\u003c/p\u003e\n"],["\u003cp\u003eConfiguring NetScaler VPX involves verifying hostname settings, creating an auditing server with specific log level and format configurations, and binding the created audit policy.\u003c/p\u003e\n"],["\u003cp\u003eConfiguring NetScaler SDX requires verifying hostname settings, setting up the syslog server, and defining the syslog parameters, including date format and time zone.\u003c/p\u003e\n"],["\u003cp\u003eThe provided parser maps various NetScaler log fields to corresponding UDM fields, including security results, network details, and principal/target information, offering comprehensive log data analysis.\u003c/p\u003e\n"]]],[],null,["# Collect NetScaler logs\n======================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n| **Note:** This feature is covered by [Pre-GA Offerings Terms](https://chronicle.security/legal/service-terms/) of the Google Security Operations Service Specific Terms. Pre-GA features might have limited support, and changes to pre-GA features might not be compatible with other pre-GA versions. For more information, see the [Google SecOps Technical Support Service guidelines](https://chronicle.security/legal/technical-support-services-guidelines/) and the [Google SecOps Service Specific Terms](https://chronicle.security/legal/service-terms/).\n\nThis document describes how you can collect the NetScaler logs by using a Google Security Operations forwarder.\n\nFor more information, see [Data ingestion to Google Security Operations overview](/chronicle/docs/data-ingestion-flow).\n\nAn ingestion label identifies the parser which normalizes raw log data to structured\nUDM format. The information in this document applies to the parser with the `CITRIX_NETSCALER`\ningestion label.\n\nConfigure NetScaler VPX\n-----------------------\n\nTo configure the NetScaler VPX to send logs to the Google Security Operations forwarder,\ndo the following:\n\n- [Verify hostname configuration](#verify-hostname-configuration).\n- [Create auditing server](#create-auditing-server).\n- [Bind the created audit policy to the server](#bind-created-audit-policy-to-server).\n\n### Verify hostname configuration\n\n1. Sign in to the NetScaler web interface using administrator credentials.\n2. Select **Configuration \\\u003e Settings**.\n3. Click **Host name, DNS IP address, and Time zone**.\n4. If the **Host name** field is empty, enter the hostname. Don't include spaces. If this field is already configured, then no action is required.\n5. In the **DNS IP address** field, verify if the local DNS IP address is specified.\n6. In the **Time zone** field, enter your time zone.\n\n### Create auditing server\n\n1. In the NetScaler web interface, select **Configuration \\\u003e System \\\u003e Auditing \\\u003e Syslog \\\u003e Servers**.\n2. Specify the syslog details in the following fields:\n - **Name**\n - **Server type**\n - **IP address**\n - **Port**\n3. Select **Log levels** as **Custom**.\n4. Select all checkboxes except **DEBUG** level in the configuration.\n5. In the **Log facility** list, select **LOCAL0**.\n6. In the **Date format** list, select **MMDDYYYY**.\n7. Select **Time zone** as **GMT**.\n8. Clear the following checkboxes:\n - **TCP logging**\n - **ACL logging**\n - **User configurable log messages**\n - **AppFlow logging**\n - **Large scale NAT logging**\n - **ALG messages logging**\n - **Subscriber logging**\n - **DNS**\n - **SSL interception**\n - **URL filtering**\n - **Content inspection logging**\n9. Click **Ok** to create the auditing server.\n\n### Bind the created audit policy to the server\n\n1. In the NetScaler web interface, select **Configuration \\\u003e System \\\u003e Auditing \\\u003e Syslog**.\n2. Click **Policies** tab.\n3. In the **Name** field, enter a name for the policy.\n4. In the **Server** list, select the policy from the previous section.\n5. Click **Create**.\n6. Right-click the created auditing policy and select **Action \\\u003e Global bindings**.\n7. Click **Add binding**.\n8. In the **Policy binding** window, do the following:\n 1. In the **Select policy** field, enter the created audit policy.\n 2. In the **Binding details** pane, in the **Priority** field, enter **120** as it is the default priority.\n 3. Click **Bind**.\n\n| **Note:** Priority is a numeric value that indicates when this policy is evaluated relative to other policies. Access Gateway gives precedence to a policy with lower priority.\n\nConfigure NetScaler SDX\n-----------------------\n\nTo configure the NetScaler SDX to send logs to the Google Security Operations forwarder,\ndo the following:\n\n- [Verify hostname configuration for NetScaler SDX](#verify-hostname-configuration-for-netscaler-sdx).\n- [Configure the syslog server](#configure-syslog-server).\n- [Configure the syslog parameters](#configure-syslog-parameters).\n\n### Verify hostname configuration for NetScaler SDX\n\n1. Sign in to the NetScaler web interface using administrator credentials.\n2. In the NetScaler web interface, select **System \\\u003e System settings**.\n3. If the **Host name** field is empty, enter the hostname. Don't include spaces. If this field is already configured, then no action is required.\n4. In the **Time zone** field, select **UTC** or **GMT**.\n\n### Configure the syslog server\n\n1. In the NetScaler web interface, select **System \\\u003e Notifications \\\u003e Syslog servers**.\n2. In the **Details** pane, click **Add**.\n3. In the **Create syslog server** window, specify values for the following syslog server parameters:\n 1. In the **Name** field, enter a name.\n 2. In the **IP address** field, enter the Google Security Operations forwarder IP address.\n 3. In the **Port** field, port number.\n 4. Select **Log levels** as **Custom**.\n 5. Select all log levels except **Debug**.\n4. Click **Create**.\n\n### Configure the syslog parameters\n\n1. In the NetScaler web interface, select **System \\\u003e Notifications \\\u003e Syslog servers**.\n2. In the **Details** pane, click **Syslog parameters**.\n3. In the **Configure syslog parameters** page, select **Date format** as **MMDDYYYY** and select **Time zone** as **GMT**.\n4. Click **Ok**.\n\nConfigure the Google Security Operations forwarder to ingest NetScaler logs\n---------------------------------------------------------------------------\n\n1. Select **SIEM Settings** \\\u003e **Forwarders**.\n2. Click **Add new forwarder**.\n3. In the **Forwarder name** field, enter a unique name for the forwarder.\n4. Click **Submit** and then click **Confirm** . The forwarder is added and the **Add collector configuration** window appears.\n5. In the **Collector name** field, type a unique name for the collector.\n6. Select **Citrix NetScaler** as the **Log type**.\n7. In the **Collector type** field, select **Syslog**.\n8. Configure the following mandatory input parameters:\n - **Protocol**: specify the connection protocol that the collector uses to listen to syslog data.\n - **Address**: specify the target IP address or hostname where the collector resides and listens to syslog data.\n - **Port**: specify the target port where the collector resides and listens to syslog data.\n9. Click **Submit**.\n\nFor more information about the Google Security Operations forwarders, see [Manage forwarder configurations through the Google Security Operations UI](/chronicle/docs/install/forwarder-management-configurations).\n\nIf you encounter issues when you create forwarders, contact [Google Security Operations support](/chronicle/docs/getting-support).\n\nField mapping reference\n-----------------------\n\nThis parser processes Citrix Netscaler SYSLOG logs in key-value format, extracting JSON-formatted data from the `message` field and enriching the UDM with information from other fields like `host.hostname` and `user_agent.original` after sanitizing them. It handles cases where the primary message is empty by falling back to the original log message.\n\nUDM mapping table\n-----------------\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]