<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Centralise Log Server Help in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/centralise-log-server-help/m-p/3553020#M745926</link>
    <description>But, I need to centralize a hundred above server's log. This log server is needed a high security, and the content of the log would be auditable and reportable.</description>
    <pubDate>Thu, 26 May 2005 23:58:21 GMT</pubDate>
    <dc:creator>Dick CHAU</dc:creator>
    <dc:date>2005-05-26T23:58:21Z</dc:date>
    <item>
      <title>Centralise Log Server Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralise-log-server-help/m-p/3553018#M745924</link>
      <description>Dear all,&lt;BR /&gt;&lt;BR /&gt;I want to setup a Centralise Log server.&lt;BR /&gt;Any secure software suggestion?</description>
      <pubDate>Thu, 26 May 2005 23:32:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralise-log-server-help/m-p/3553018#M745924</guid>
      <dc:creator>Dick CHAU</dc:creator>
      <dc:date>2005-05-26T23:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: Centralise Log Server Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralise-log-server-help/m-p/3553019#M745925</link>
      <description>I would suggest a low tech, effecive solution.&lt;BR /&gt;&lt;BR /&gt;Set up an old hp/ux or Linux box. Enable openssh with public keys exchanged to all servers.&lt;BR /&gt;&lt;BR /&gt;Make a massive filesystem, called /logs&lt;BR /&gt;&lt;BR /&gt;Make a subdirectory for each system.&lt;BR /&gt;&lt;BR /&gt;Have the individual systems scp -p the logfiles  you want centralized on a schedule.&lt;BR /&gt;&lt;BR /&gt;scp -p /var/adm/syslog/syslog.log logserver:/logs/hostname&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 26 May 2005 23:48:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralise-log-server-help/m-p/3553019#M745925</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-05-26T23:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Centralise Log Server Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralise-log-server-help/m-p/3553020#M745926</link>
      <description>But, I need to centralize a hundred above server's log. This log server is needed a high security, and the content of the log would be auditable and reportable.</description>
      <pubDate>Thu, 26 May 2005 23:58:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralise-log-server-help/m-p/3553020#M745926</guid>
      <dc:creator>Dick CHAU</dc:creator>
      <dc:date>2005-05-26T23:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Centralise Log Server Help</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/centralise-log-server-help/m-p/3553021#M745927</link>
      <description>Do you want just syslog data or other&lt;BR /&gt;logs as well?&lt;BR /&gt;&lt;BR /&gt;In addition to Steven's suggestion, another standard approach here is&lt;BR /&gt;syslog forwarding.  On each client system you'd add a forwarding line to&lt;BR /&gt;/etc/syslog.conf (man syslogd for details) and the &lt;BR /&gt;syslog message will be written to the local syslog and&lt;BR /&gt;additionally sent to your consolidating host. &lt;BR /&gt;&lt;BR /&gt;This syslog forwarding approach has several undesirable&lt;BR /&gt;characteristics:&lt;BR /&gt;&lt;BR /&gt;- it uses UDP. You are not guaranteed to get&lt;BR /&gt;  all log messages. They aren't "lost" in&lt;BR /&gt;  the sense that they are still present&lt;BR /&gt;  in the originating host's syslog.log but&lt;BR /&gt;  they are not guaranteed to be in the remote consolidated log. &lt;BR /&gt;&lt;BR /&gt;- UDP isn't secure enough for some. If your care about&lt;BR /&gt;  security on the wire (packet sniffing) then&lt;BR /&gt;  this isn't a good solution. &lt;BR /&gt;&lt;BR /&gt;One approach that helps remedy the above issues it to &lt;BR /&gt;replace syslogd with an open source tool called syslog-ng&lt;BR /&gt;(next generation). syslog-ng offers a TCP/IP transport&lt;BR /&gt;in addition to UDP. With TCP you can now  encrypt &lt;BR /&gt;the traffic using tools like ssh tunnel and stunnel. &lt;BR /&gt;syslog-ng has better filtering features and log &lt;BR /&gt;naming features that help with log rotation, etc. &lt;BR /&gt;&lt;BR /&gt;Note that even when using the TCP/IP transport, syslog-ng &lt;BR /&gt;cannot guarantee there will be no message loss. &lt;BR /&gt;It helps however and you can control the buffer &lt;BR /&gt;sizes on the client side to try and minimize this issue.  &lt;BR /&gt;&lt;BR /&gt;To secure your centralized log server, look at the bastille&lt;BR /&gt;tool. You typically want to lock this system down&lt;BR /&gt;very tightly and bastille can help you do that.</description>
      <pubDate>Mon, 30 May 2005 21:42:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/centralise-log-server-help/m-p/3553021#M745927</guid>
      <dc:creator>PeterWolfe</dc:creator>
      <dc:date>2005-05-30T21:42:09Z</dc:date>
    </item>
  </channel>
</rss>

