Configure Red Hat Enterprise Linux to receive event logs
Set up a Syslog on Red Hat Enterprise Linux 8 or later
The following steps describe how to configure rsyslog on Red Hat Enterprise Linux 8 and later versions to receive logs from Deep Security:
- Log in as root.
- Execute the following command:
vi /etc/rsyslog.conf
- Uncomment the following lines near the top of the
rsyslog.conf
to change them from
#module(load="imudp")
to
#input(type="imudp" port="514")
#module(load="imtcp")
#input(type="imtcp" port="514")
module(load="imudp")
input(type="imudp" port="514")
module(load="imtcp")
input(type="imtcp" port="514")
- Add the following two lines of text to the end of the
rsyslog.conf
:#Save Deep Security Manager logs to DSM.log
Local4.* /var/log/DSM.log
You may need to replaceLocal4
with another value, depending on your manager settings.
- Save the file and exit.
- Create the
/var/log/DSM.log
file by typingtouch /var/log/DSM.log
- Set the permissions on the DSM log so that syslog can write to it.
- Save the file and exit.
- Restart syslog by executing the following command:
systemctl restart rsyslog
When Syslog is functioning, the logs are populated in /var/log/DSM.log
Set up a Syslog on Red Hat Enterprise Linux 6 or 7
The following steps describe how to configure rsyslog on Red Hat Enterprise Linux 6 or 7 to receive logs from Deep Security:
- Log in as root.
- Execute the following command:
vi /etc/rsyslog.conf
- Uncomment the following lines near the top of the
rsyslog.conf
to change them from
#$ModLoad imudp
to
#$UDPServerRun 514
#$ModLoad imtcp
#$InputTCPServerRun 514
$ModLoad imudp
$UDPServerRun 514
$ModLoad imtcp
$InputTCPServerRun 514
- Add the following two lines of text to the end of the
rsyslog.conf
:#Save Deep Security Manager logs to DSM.log
Local4.* /var/log/DSM.log
You may need to replaceLocal4
with another value, depending on your manager settings. - Save the file and exit.
- Create the
/var/log/DSM.log
file by typingtouch /var/log/DSM.log
- Set the permissions on the DSM log so that syslog can write to it.
- Save the file and exit.
- Restart syslog by executing the following command:
service rsyslog restart
When Syslog is functioning, the logs are populated in /var/log/DSM.log
Set up a Syslog on Red Hat Enterprise Linux 5
The following steps describe how to configure Syslog on Red Hat Enterprise Linux 5 to receive logs from Deep Security:
- Log in as root.
- Execute the following command:
vi /etc/syslog.conf
- Add the following two lines of text to the end of the
syslog.conf
:#Save Deep Security Manager logs to DSM.log
Local4.* /var/log/DSM.log
You may need to replaceLocal4
with another value, depending on your manager settings. - Save the file and exit.
- Create the
/var/log/DSM.log
file by typingtouch /var/log/DSM.log
- Set the permissions on the DSM log so that syslog can write to it.
- Execute the following command:
:
vi /etc/sysconfig/syslog
- Modify the line
SYSLOGD_OPTIONS
and add a-r
to the options. - Save the file and exit.
- Restart syslog by executing the following command:
/etc/init.d/syslog restart
When Syslog is functioning, the logs are populated in /var/log/DSM.log