Skip to content

zebrium/ze-log-forwarder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

#LOG FORWARDER DETAILS Zebrium's Log Forwarder accepts both syslogs and raw logs and forwards to Zebrium for automated Anomaly detection.

Our github repository is located here.

ze-log-forwarder

Getting Started

Preparation

  1. By default ze-log-forwarder container uses TCP and UDP port 5514 for syslog, and TCP port 5170 for TCP forwarding. Please make sure clients can reach host IP on those ports.
  2. For syslog forwarding, make sure host firewall does not block port 5514 for both TCP and UDP. For TCP forwarding, make sure TCP port 5170 is open.
  3. Install docker software if it is not installed.

Forward Syslog

Installation

  1. To support syslog over TCP and UDP, run the following command as root, make sure you replace <...> with real values.
docker run -d --name="zlog-forwarder" --restart=always \
    -p 5514:5514/tcp \
    -p 5514:5514/udp \
    -e ZE_LOG_COLLECTOR_URL="<ZE_LOG_COLLECTOR_URL>" \
    -e ZE_LOG_COLLECTOR_TOKEN="<ZE_LOG_COLLECTOR_TOKEN>" \
    -e ZE_DEPLOYMENT_NAME="<DEPLOYMENT_NAME>" \
    zebrium/log-forwarder:latest
  1. To support syslog over TLS and UDP:
    1. Create/copy root certificate, host certificate and host private key files to a directory on the host which will be running log-forwarder container.
    2. Run the following command as root:
docker run -d --name="zlog-forwarder" --restart=always \
    -p 5514:5514/tcp \
    -p 5514:5514/udp \
    -v <USER_SERVER_CERTS_KEY_DIR>:/fluentd/tls
    -e ZE_SYSLOG_PROTOCOL="tls" \
    -e ZE_LOG_COLLECTOR_URL="<ZE_LOG_COLLECTOR_URL>" \
    -e ZE_LOG_COLLECTOR_TOKEN="<ZE_LOG_COLLECTOR_TOKEN>" \
    -e ZE_DEPLOYMENT_NAME="<DEPLOYMENT_NAME>" \
    zebrium/log-forwarder:latest

Client Configuration

  1. Use host IP as syslog server IP address, and port 5514 for syslog port.

  2. Configure rsyslog

    1. To use UDP, add the following to the end of rsyslog configuration file *.* @<LOG_FORWARDER_HOST_IP>:5514
    2. To use TCP, add the following to the end of rsyslog configuration file *.* @@<LOG_FORWARDER_HOST_IP>:5514
    3. To use TLS:
      1. copy client_configs/rsyslog/25-zebrium.conf to /etc/rsyslog.d/,
      2. Open the file, replace CLIENT_SSL_CERT_PATH with real client SSL certificate path, change SERVER_HOST to the hostname running log-forwarder container, and SERVER_DOMAIN_NAME to the domain of the host running log-forwarder container.
      3. Restart rsyslog service.

Setup

No additional setup is required

Forward Log via TCP

Installation

Run the following command as root, make sure you replace <...> with real values.

docker run -d --name="zlog-forwarder" --restart=always \
    -p 5170:5170/tcp
    -e ZE_LOG_COLLECTOR_URL="<ZE_LOG_COLLECTOR_URL>" \
    -e ZE_LOG_COLLECTOR_TOKEN="<ZE_LOG_COLLECTOR_TOKEN>" \
    -e ZE_DEPLOYMENT_NAME="<DEPLOYMENT_NAME>" \
    -e ZE_TCP_HOSTNAME="<TCP_FORWARDER_HOSTNAME>" \
    -e ZE_TCP_LOGBASE="tcp_forwarder" \
    -e ZE_TIMEZONE="<TIME_ZONE>" \
    zebrium/log-forwarder:latest

TIME_ZONE should be the timezone of log messages, for example, "UTC" or "EDT".

Setup

No additional setup is required

Testing your installation

Once the log forwarder software has been deployed in your environment, your logs and anomaly detection will be available in the Zebrium UI.

Contributors

  • Brady Zuo (Zebrium)

About

Zebrium log-forwarder software repo

Resources

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published