Learn how to configure the remote server
for logging via TCP using TLS encryption.
Before you begin
Generate the certificates required to use
TLS encryption and import them to the remove server, making sure they have the proper
read permissions (0644). Make sure you have noted the filepaths to each
certificate.
About this task
You install an rsyslog utilities package
and add content to tcp.conf on the remote server to enable TLS encryption over
TCP.
Procedure
-
If not already installed, run
the following command on the remote server to install the package
rsyslog-gnutls.
$ sudo apt-get install rsyslog-gnutls
-
At the command prompt, create
and open the following file in your preferred text editor.
$ /etc/rsyslog.d/tcp.conf
-
Copy and paste the following
text into the tcp.conf file, making sure the certificate filepaths are correct
and replacing the port number if needed with one you choose.
global(
DefaultNetstreamDriver="gtls"
DefaultNetstreamDriverCAFile="/path/to/ca-certificate/ca.pem"
DefaultNetstreamDriverCertFile="/path/to/server-certificate/server-cert.pem"
DefaultNetstreamDriverKeyFile="/path/to/server-key/server-key.pem"
)
# load TCP listener
module(
load="imtcp"
StreamDriver.Name="gtls"
StreamDriver.Mode="1"
StreamDriver.Authmode="anon"
)
# start up listener at port 514
input(
type="imtcp"
port="514"
-
Save and close tcp.conf.
-
Run the following command to
restart the rsyslog service.
$ sudo systemctl restart rsyslog
-
Run the following command to
verify the rsyslog service status.
$ sudo systemctl status rsyslog