{"id":944,"date":"2026-03-28T08:02:43","date_gmt":"2026-03-28T08:02:43","guid":{"rendered":"https:\/\/networkingnotebook.com\/?p=944"},"modified":"2026-03-28T08:55:58","modified_gmt":"2026-03-28T08:55:58","slug":"syslog","status":"publish","type":"post","link":"https:\/\/networkingnotebook.com\/?p=944","title":{"rendered":"Syslog"},"content":{"rendered":"\n<p>Today I am going to talk about syslog. Syslog is a UDP (port 514) protocol that is the standard for logging where it allows network devices to generate, store and send event based notifications to a centralized server. If you have been doing any type of labs, you have definitely seen a syslog message as they appear automatically in the CLI of cisco messages. Syslogs come in a specific format and are useful for monitoring device and network health like when a router fails, or an interface fails. It is good for troubleshooting system or network issues like if an interface failing caused a routing outage. Syslogs are also great for security auditing and event tracking so whenever a user has SSH\u2019d or failed to SSH into the router or network device, a syslog message shows details as to when that event occurred. Below is the format of a syslog message, and I will be breaking down each part of the notification.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"136\" src=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-35-1024x136.png\" alt=\"\" class=\"wp-image-957\" srcset=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-35-1024x136.png 1024w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-35-300x40.png 300w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-35-768x102.png 768w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-35-1536x204.png 1536w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-35-2048x272.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Sequence Numbers- <\/strong>The first part of a syslog message is an optional field called \u201csequence numbers.\u201d These are unique, incrementing numerical numbers that are used to identify each syslog message generated by a network device. These help to detect missing logs, duplicate logs or out of order logs. These sequence numbers will make it easier to detect all of those because one log should not have the same sequence number as another log.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"305\" src=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-33-1024x305.png\" alt=\"\" class=\"wp-image-954\" srcset=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-33-1024x305.png 1024w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-33-300x89.png 300w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-33-768x228.png 768w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-33-1536x457.png 1536w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-33-2048x609.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Timestamps- <\/strong>The next field is called timestamps which is a field in a syslog message that records the exact date and time an event occurred on the device. This also makes the network administrators job easier and helps them to troubleshoot network problems effectively. Timestamps are great for event correlation, allowing network administrators to correlate how one event on a device relates to other events that happened on other devices. An example of this would be an interface causing a router outage. A syslog would be generated with a timestamp stating when the interface failed or shut down, followed by another syslog message and timestamp of the routing protocol neighbor adjacency failing and the route being withdrawn from the routing table. These syslog messages which can happen on multiple devices can be aggregated and compared to prove that the interface that had failed caused the routing outage, making it much easier to troubleshoot. If there had been no timestamp, the hypothesis that the interface causing the routing outage would not be provable because it could have been earlier in the day or perhaps after the routing issues.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"319\" src=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-32-1024x319.png\" alt=\"\" class=\"wp-image-953\" srcset=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-32-1024x319.png 1024w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-32-300x93.png 300w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-32-768x239.png 768w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-32-1536x478.png 1536w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-32-2048x637.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Facility- The next part of the syslog message is the facility. The facility is the field of the syslog message after the timestamp, that indicates the source or type of system component that generated the message. Common types of system components where a syslog message can originate from are a kernel (syslog from OS kernel) , mail system, syslog internal system, or users (logs from use-level applications and processes)\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"316\" src=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-31-1024x316.png\" alt=\"\" class=\"wp-image-952\" srcset=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-31-1024x316.png 1024w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-31-300x93.png 300w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-31-768x237.png 768w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-31-1536x474.png 1536w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-31-2048x633.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Severity-<\/strong> The next field in a syslog message is \u201cSeverity.\u201d Severity is the part of the syslog message that provides a numerical value ranging from 0 to 7 that indicates the urgency or importance of a message. It can range from a message being an emergency which is level 0 to something mediocre like a notification (level 5), to something that is not urgent at all like level 7 (debugging.) An example would be administratively turning off or turning on an interface, this is a level 5 (on cisco) which is just a notification or notice level of importance. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"316\" src=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-30-1024x316.png\" alt=\"\" class=\"wp-image-951\" srcset=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-30-1024x316.png 1024w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-30-300x92.png 300w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-30-768x237.png 768w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-30-1536x473.png 1536w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-30-2048x631.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"590\" height=\"1024\" src=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-34-590x1024.png\" alt=\"\" class=\"wp-image-955\" srcset=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-34-590x1024.png 590w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-34-173x300.png 173w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-34-768x1332.png 768w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-34-885x1536.png 885w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-34-1180x2048.png 1180w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-34-scaled.png 1476w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><\/figure>\n\n\n\n<p><strong>Mnemonic-<\/strong> The field that comes after severity is \u201cMnemonic.\u201d Mnemonic is a field of the syslog message that is a short uppercase, text-string code that identifies the type of event that occurred on the device. These will be seen as something like LINK_DOWN or UPDOWN. LINKDOWN means that the \u201cevent\u201d is the link shutting down. UPDOWN is the \u201cevent\u201d that the interface has changed its state. CONFIG_I indicates that the configuration was changed. As you can see these messages are purely uppercase (I am only talking about Cisco for the sake of CCNA).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"327\" src=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-29-1024x327.png\" alt=\"\" class=\"wp-image-950\" srcset=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-29-1024x327.png 1024w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-29-300x96.png 300w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-29-768x245.png 768w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-29-1536x490.png 1536w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-29-2048x653.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Description<\/strong>&#8211; The last part of the syslog message is the \u201cdescription.\u201d The description is usually at the end of the syslog message that provides a detailed explanation of the event that occurred on the device. It provides a human readable explanation so the reader can gain more context as to what happened. The type of description message you would receive is \u201clink g0\/1 changed state to down.\u201d From that description you know the the exact link #(g0\/1) and what exactly happened (the link changed to a down state.)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"323\" src=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-28-1024x323.png\" alt=\"\" class=\"wp-image-948\" srcset=\"https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-28-1024x323.png 1024w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-28-300x95.png 300w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-28-768x242.png 768w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-28-1536x484.png 1536w, https:\/\/networkingnotebook.com\/wp-content\/uploads\/2026\/03\/image-28-2048x646.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Today I am going to talk about syslog. Syslog is a UDP (port 514) protocol that is the standard for logging where it allows network devices to generate, store and send event based notifications to a centralized server. If you have been doing any type of labs, you have definitely seen a syslog message as&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-944","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/posts\/944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=944"}],"version-history":[{"count":5,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/posts\/944\/revisions"}],"predecessor-version":[{"id":958,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=\/wp\/v2\/posts\/944\/revisions\/958"}],"wp:attachment":[{"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkingnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}