sudo dnf install epel-release
sudo dnf install syslog-ng vim logrotate bzip2
sudo systemctl enable syslog-ng && sudo systemctl start syslog-ng
https://github.com/syslog-ng/syslog-ng/issues/2667
You may need to fix syslog-ng's systemd service file as it fails to start after a reboot because the network isn't ready.
sudo vim /usr/lib/systemd/system/syslog-ng.service
Add the following under [Unit]
Wants=network.target network-online.target After=network.target network-online.target
Reload the deamon
sudo systemctl daemon-reload
https://www.linuxjournal.com/content/creating-centralized-syslog-server
https://community.spiceworks.com/topic/2084362-syslog-ng-for-multiple-sources
https://www.rfaircloth.com/tags/syslog-ng/
https://lists.balabit.hu/pipermail/syslog-ng/2014-March/021290.html
http://monitoringartist.github.io/community.zenoss.org/message/48987.html
sudo vim /etc/syslog-ng/conf.d/remote.devices.conf
### Accept connections from tcp/upd source s_network_a { udp(ip(0.0.0.0) port(514)); tcp(ip(0.0.0.0) port(514) max-connections(5000)); }; ### Filters to separate logs by ip/host and a filter to catch all that don't match filter f_ht49_langw_haddentech_com { netmask("172.21.49.1/32"); or host("ht49-langw.haddentech.com"); }; filter f_ht49_wangw_haddentech_com { netmask("172.21.49.2/32"); or host("ht49-wangw.haddentech.com"); }; filter f_unknown { not ( netmask("172.21.49.1/32") or netmask("172.21.49.2/32") or host("ht49-langw.haddentech.com") or host("ht49-wangw.haddentech.com") ); }; ### Destinations for to keep a local copy and send them on further. Note the SIEM/OSSIM destination has spoof_source(yes) otherwise the SIEM will log it under the syslog servers IP. destination d_ossim { udp("172.18.18.40" spoof_source(yes)); }; destination d_ht49_langw_haddentech_com { file("/var/log/remote/ht49-langw.haddentech.com.log"); }; destination d_ht49_wangw_haddentech_com { file("/var/log/remote/ht49-wangw.haddentech.com.log"); }; destination d_unknown { file("/var/log/remote/unknown.log"); }; ### And it all comes together... log { source(s_network_a); filter(f_ht49_langw_haddentech_com); destination(d_ht49_langw_haddentech_com); destination(d_ossim); }; log { source(s_network_a); filter(f_ht49_wangw_haddentech_com); destination(d_ht49_wangw_haddentech_com); destination(d_ossim); }; log { source(s_network_a); filter(f_unknown); destination(d_unknown); destination(d_ossim); };
sudo mkdir /var/log/remote
sudo systemctl restart syslog-ng
sudo firewall-cmd --permanent --add-port=514/tcp sudo firewall-cmd --permanent --add-port=514/udp sudo firewall-cmd --reload
If you need to use non-standard ports or need to troubleshoot or use semanage to make a rule here is an example of what to do:
sudo dnf install policycoreutils-python sudo semanage port -a -t syslogd_port_t -p tcp 8100 sudo semanage port -a -t syslogd_port_t -p udp 8100 sudo semanage fcontext -a -t var_log_t /var/splunk-syslog sudo restorecon -v '/var/splunk-syslog' sudo logger -d -P 8100 -n 127.0.0.1 -p 1 "test2" sudo cd /root sudo mkdir selinux sudo cd selinux sudo audit2allow -M syslog-ng-modified -l -i /var/log/audit/audit.log #verify the file does not contain anything no related to syslog sudo vim syslog-ng-modified.te sudo semodule -i syslog-ng-modified.pp
http://danielsokolowski.blogspot.com/2012/09/maximum-logrotate-compression-with-bzip2.html
sudo vim /etc/logrotate.d/remote
/var/log/remote/*.log { daily create 0644 root root rotate 900 maxage 395 maxsize 100M dateext dateformat -%Y-%m-%d_%s notifempty compress compresscmd /bin/bzip2 uncompresscmd /bin/bunzip2 compressoptions -9 compressext .bz2 copytruncate }
Note: Logrotate runs once daily by default, if your logs are getting too big before days end then you'll want to increase the frequency that logrotate runs.