Configure Red Hat Enterprise Linux to receive event logs

Set up a Syslog on Red Hat Enterprise Linux 8 or later

The following steps describe how to configure rsyslog on Red Hat Enterprise Linux 8 and later versions to receive logs from Deep Security:

  1. Log in as root.
  2. Execute the following command:

    vi /etc/rsyslog.conf
  3. Uncomment the following lines near the top of the rsyslog.conf to change them from

    #module(load="imudp")
    #input(type="imudp" port="514")

    #module(load="imtcp")
    #input(type="imtcp" port="514")

    to

    module(load="imudp")
    input(type="imudp" port="514")

    module(load="imtcp")
    input(type="imtcp" port="514")

  4. Add the following two lines of text to the end of the rsyslog.conf:
    • #Save Deep Security Manager logs to DSM.log
    • Local4.* /var/log/DSM.log

      You may need to replace Local4 with another value, depending on your manager settings.
  5. Save the file and exit.
  6. Create the /var/log/DSM.log file by typing touch /var/log/DSM.log
  7. Set the permissions on the DSM log so that syslog can write to it.
  8. Save the file and exit.
  9. Restart syslog by executing the following command:

    systemctl restart rsyslog

When Syslog is functioning, the logs are populated in /var/log/DSM.log

Set up a Syslog on Red Hat Enterprise Linux 6 or 7

The following steps describe how to configure rsyslog on Red Hat Enterprise Linux 6 or 7 to receive logs from Deep Security:

  1. Log in as root.
  2. Execute the following command:
    vi /etc/rsyslog.conf
  3. Uncomment the following lines near the top of the rsyslog.conf to change them from

    #$ModLoad imudp
    #$UDPServerRun 514

    #$ModLoad imtcp
    #$InputTCPServerRun 514

    to

    $ModLoad imudp
    $UDPServerRun 514

    $ModLoad imtcp
    $InputTCPServerRun 514

  4. Add the following two lines of text to the end of the rsyslog.conf:
    • #Save Deep Security Manager logs to DSM.log
    • Local4.* /var/log/DSM.log
    You may need to replace Local4 with another value, depending on your manager settings.
  5. Save the file and exit.
  6. Create the /var/log/DSM.log file by typing touch /var/log/DSM.log
  7. Set the permissions on the DSM log so that syslog can write to it.
  8. Save the file and exit.
  9. Restart syslog by executing the following command:

    service rsyslog restart

When Syslog is functioning, the logs are populated in /var/log/DSM.log

Set up a Syslog on Red Hat Enterprise Linux 5

The following steps describe how to configure Syslog on Red Hat Enterprise Linux 5 to receive logs from Deep Security:

  1. Log in as root.
  2. Execute the following command:
    vi /etc/syslog.conf
  3. Add the following two lines of text to the end of the syslog.conf :
    • #Save Deep Security Manager logs to DSM.log
    • Local4.* /var/log/DSM.log
    You may need to replace Local4 with another value, depending on your manager settings.
  4. Save the file and exit.
  5. Create the /var/log/DSM.log file by typing touch /var/log/DSM.log
  6. Set the permissions on the DSM log so that syslog can write to it.
  7. Execute the following command:
    :
    vi /etc/sysconfig/syslog
  8. Modify the line SYSLOGD_OPTIONS and add a -r to the options.
  9. Save the file and exit.
  10. Restart syslog by executing the following command:

    /etc/init.d/syslog restart

When Syslog is functioning, the logs are populated in /var/log/DSM.log