Field guide and install notes for running Scalyr Agent 2 as the SentinelOne Collector on Rocky Linux 9, Ubuntu 22.04 LTS, and Ubuntu 24.04 LTS, using a dedicated Python virtualenv and a simple control wrapper.
Tip
Want to see how the sausage is made? Keep reading for the manual walkthrough.
In a hurry? Skip the rest and run the TURBO installer (auto-detects your OS and runs the right script):
# Auto-detects Ubuntu 22.04, 24.04, or Rocky Linux 9 and runs the appropriate installer
# Note: Requires 'curl' to be installed on the system
sudo bash -c "$(curl -fsSL https://raw.githubusercontent.com/sva-s1/collector/main/scripts/turbo-collector-setup.sh)"The auto-selector will verify and install any missing dependencies (including ca-certificates) using your system's package manager, then fetch and run the platform-specific installer with root privileges. Note that curl must be installed first to download the initial script.
Important
If this guide saves you time, please star the repo on GitHub so others can find it more easily.
Upstream agent code and full documentation live in the official project:
https://github.com/scalyr/scalyr-agent-2
- Install guide (Rocky Linux 9): end‑to‑end venv + wrapper + systemd + starter
agent.json
→docs/INSTALL-ROCKY9.MD - Install guide (Ubuntu 24.04 LTS): end‑to‑end venv + wrapper + systemd + starter
agent.json
→docs/INSTALL-UBUNTU24-04.MD - Install guide (Ubuntu 22.04 LTS): end‑to‑end venv + wrapper + systemd + starter
agent.json
→docs/INSTALL-UBUNTU22-04.MD - Install guide (air‑gapped / no‑internet): prep and offline install flow
→docs/INSTALL-AIRGAPPED.MD - Upstream agent code, full docs, and changelog
→https://github.com/scalyr/scalyr-agent-2
┌──────────────────────────────┐
│ FortiGate / other devices │
│ - Syslog over TCP/UDP 514 │
└──────────────┬───────────────┘
│
Syslog (514/tcp,514/udp)
│
┌────────▼────────┐
│ Collector VM │
│ Rocky 9 / │
│ Ubuntu 24.04 │
│ │
│ scalyr-agent-2 │
│ (Python venv) │
└────────┬────────┘
│ HTTPS
│
┌────────▼──────────────────────┐
│ SentinelOne backend (XDR / │
│ SDL ingestion API) │
└───────────────────────────────┘
The starter agent.json shipped in this repo is configured to:
- listen for FortiGate syslog on TCP/UDP 514
- write messages into
fortigate.log - use the
marketplace-fortinetfortigate-latestOCSF parser
You can add more syslog_monitor entries for additional products (other firewalls, appliances, etc.); just ensure each monitor uses a unique port (or port pair) and distinct message_log / parser values.
