http://www.serverwatch.com/tutorials/article.php/3600641/Build-a-Secure-Logging-Server-With-syslog-ng.htm
http://www.syslog.org/wiki/Syslog-ng/HowToGuides
Splunk:
http://ubuntuforums.org/showthread.php?t=900745
Install:
cd /opt
sudo wget 'http:'
sudo tar xvfz splunk-3.4.6-51113-Linux-i686.tgz
sudo splunk/bin/splunk start
Update:
cd /opt
sudo splunk/bin/splunk stop
sudo wget 'new-splunk-version-link-goes-here'
sudo tar xvfz new-splunk-downloaded-version.tgz
sudo splunk/bin/splunk start
Configurations:
Listen for logs on port 514:
Most devices and many apps (including syslog) use port 514 for sending log info. You'll want Splunk to be listening.
- navigate to your Splunk web UI (http://your.server.ip.address:8000)
- click "Admin"
- click "Data Inputs"
- click "Network Ports"
- "New Input" button.
- choose "UDP" and the port number will automagically change to 514.
- click the "Submit" button to save the configuration change
Start upon bootup:
Pretty self-explanatory. When the machine boots up, so does Splunk.
Code:
sudo /opt/splunk/bin/splunk enable boot-start
Since the free version of Splunk doesn't secure the web UI, I lock down access to all that sensitive information through iptables. Obviously, you'll want to replace "ip.address1.to.allow" with your address or a range you want to allow access from (i.e. 10.10.10.35 or 10.10.10.0/24).
Code:
sudo iptables -A INPUT -s ip.address1.to.allow -p tcp --dport 8000 -j ACCEPT
sudo iptables -A INPUT -s ip.address2.to.allow -p tcp --dport 8000 -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 8000 -j DROP
SEND MAC/LINUX LOGS TO SPLUNK:
This is a two step process where you add your Slunk server to the list of known hosts on the client machine and then tell the syslog process to forward logs to Splunk.
Add the following line to /etc/hosts (NOTE: Use tabs, spaces won't work.)
Code:
ip.address.of.splunkserver splunkserver
Code:
# additional config for sending logs to splunk
*.info @splunksever
SEND WINDOWS LOGS TO SPLUNK
As far as I know, there is no simple equivalent of syslog for Windows installed by default. So you'll need to install some type of utility or app to send logs. I recommend Snare.
Download and Install Snare here: http://www.intersectalliance.com/dow...-MultiArch.exe
Open the Snare interface to configure its log management:
- Click on "Network Configuration"
- Set the "Destination Snare Server Address" to Splunk's IP
- Change "Destination Port" to 514
- Click the checkbox to "Enable SYSLOG header"
- Select your desired "Syslog Priority" level from the drop down menu.
- Click the "Change Configuration" button
You might need to add an exception for Snare in the Windows Firewall. (tested in XP)
- Navigate to the Windows Firwall settings (Start > Control Panel > Windows Firewall)
- Click on the Exceptions Tab
- Click the "Add Program" button
- Browse to C:\Program Files\Snare\SnareCore (or wherever you installed Snare)
That's all... for now.
No comments:
Post a Comment