Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Info

You can use the System Log Viewer to access system logs. For more information, see System Log Viewer in IGEL OS 12 .

...

Menu path: System > Logging

Local logging

...

 The ☑ The log messages are stored locally in /var/log. The format is human-readable. Log rotation is applied.

...

 The ☐ The log messages are not stored locally.

...

This parameter is effective if Local logging is activated.

...

The log messages are stored in a persistent partition on the device. This partition is encrypted.

...

The log messages are stored in temporary files that are deleted on reboot.

...

Include Page
_Manage List
_Manage List

Include Page
_Clicking Add
_Clicking Add

  • Local port
    Port on which the local server listens for log messages

  • Transport protocol
    Protocol to be used for the transmission of log messages
    Possible options:

    • TCP (Default)

    • UDP

  • Name
    Hostname of the sender (optional). This is useful for filtering the log messages based on the clients that have sent them.

  • Local address

Optional parameter; on multihomed machines (i. e. machines with multiple addresses), this specifies to which local address rsyslog is bound. If no address is specified it defaults to 0.0.0.0, so that rsyslog listens on every network interface. For more information, see the official documentation at https://www.rsyslog.com/doc/v8-stable/configuration/modules/imtcp.html.

...

Include Page
_Manage List
_Manage List

Include Page
_Clicking Add
_Clicking Add

  • Remote address

IP address or hostname of the remote server

...

  • Syslog style template
    Format in which the messages are sent
    Possible options:

    • RSYSLOG_TraditionalForwardFormat (Default)

    • RSYSLOG_ForwardFormat

    • RSYSLOG_SyslogProtocol23Format

    • RSYSLOG_StdJSONFmt

  • TLS enabled

...

 TLS ☑ TLS encryption for the transmission of log messages is enabled.

...

Transmitted log messages are not encrypted. (Default)

...

Path to the local CA root certificate file in PEM format which is used to verify the authenticity of the X.509 certificate of your log collector and analyzer. If the UMS is used to transfer the certificate file to devices, the same path and file name as in the UMS must be entered. Example: /wfs/ca-certs/ca.pem
For more information, see Logging and Log Evaluation /wiki/spaces/ENLITESECURITYP/pages/74821475.