Ubuntu systems can be configured to act as central Syslog servers that collect, and analyze Syslogs from various other devices. Below are the steps to configure a central rsyslog server that runs on Ubuntu 18.04 LTS.
apt-get install rsyslog -y
systemctl status rsyslog
$ModLoad imudp
$UDPServerRun 514
$ModLoad imtcp
$InputTCPServerRun 514
Note: Port 514 is the default port of UDP and TCP. At anytime, you can change the port number.
$AllowedSender TCP
$AllowedSender UDP
$template remote-incoming-logs,
"/var/log/%HOSTNAME%/%PROGRAMNAME%.log"
*.* ?remote-incoming-logs
Save the configuration and close.
netstat -4altunp | grep 514 and see if the output shows LISTEN against TCP AND UDP fields.
ls /var/log/rsyslog-client/
Simply viewing rsyslogs won't suffice, as you have to interpret and analyze the logs across different files for critical events like authorization failures and unusual system configuration changes. Syslogs contain essential information about who did what, from where and when for all events. These insights enable you to identify anomalous activities in your network devices, and help in mitigating threats and preventing attacks. Manually doing this would be tedious. A log management solution would do all these for you.
EventLog Analyzer, an effective log management solution interprets and analyzes log data to generate intuitive reports. Alerts can be configured using EventLog Analyzer to flag deviant behavior as threats, and you can be notified in real-time via SMS or email about an impending attack. Click here to know more.
Interested in a
log management
solution?
Manage logs, comply with IT regulations, and mitigate security threats.
Our support technicians will get back to you at the earliest.
Zoho Corporation Pvt. Ltd. All rights reserved.