This article outlines how to enable and configure Secure Remote Logging in the KACE Systems Management Appliance.
Enabling remote syslog-ng or rsyslog allows you to send server log data to a remote syslog-ng or rsyslog server.
source tls_source {
tcp(
ip(0.0.0.0)
port(6514)
tls(
key_file("/path/to/serverkey.pem")
cert_file("/path/to/servercert.pem")
peer-verify(optional-untrusted)
)
);
};
log { source(tls_source); destination(messages); };
-Restart syslog-ng service.
>sudo apt-get upgrade rsyslog >sudo apt-get install rsyslog-gnutisglobal(
defaultNetstreamDriver="gtls"
defaultNetstreamDriverCertFile="/path/to/servercert.pem"
defaultNetstreamDriverKeyFile="/path/to/serverkey.pem"
)
module(load="imtcp")
input(type="imtcp" port"6514" StreamDriver.Name="gtls" StreamDriver.Mode="1" StreamDriver.AuthMode="anon")
Restart rsyslog service
Note: The servercert.pem and serverkey.pem files are generated by the SMA and can be downloaded from the Security Settings page.
The server key file is used to authenticate the server, while the server certificate file is used to encrypt the connection between the SMA and the remote syslog server.
Please update the configuration file names servercert.pem and serverkey.pem with the actual file names you downloaded from the SMA.