<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Setup Secure (Encrypted) Syslog in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/391221#M47754</link>
    <description>&lt;P&gt;Has anyone had luck setting up secure (encrypted) syslog with this Addon? It only mentions creating a TCP input which would not be encrypted. Our Proofpoint is hosted at their cloud, so encryption between their cloud and our Heavy Forwarder onsite is imperative.&lt;/P&gt;</description>
    <pubDate>Tue, 15 May 2018 12:15:55 GMT</pubDate>
    <dc:creator>Kieffer87</dc:creator>
    <dc:date>2018-05-15T12:15:55Z</dc:date>
    <item>
      <title>Setup Secure (Encrypted) Syslog</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/391221#M47754</link>
      <description>&lt;P&gt;Has anyone had luck setting up secure (encrypted) syslog with this Addon? It only mentions creating a TCP input which would not be encrypted. Our Proofpoint is hosted at their cloud, so encryption between their cloud and our Heavy Forwarder onsite is imperative.&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 12:15:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/391221#M47754</guid>
      <dc:creator>Kieffer87</dc:creator>
      <dc:date>2018-05-15T12:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: Setup Secure (Encrypted) Syslog</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/391222#M47755</link>
      <description>&lt;P&gt;Hey,&lt;BR /&gt;
you could use &lt;CODE&gt;[tcp-ssl://1234]&lt;/CODE&gt; in &lt;CODE&gt;inputs.conf&lt;/CODE&gt; - it offers encrypted receiving of data.&lt;BR /&gt;
However, best practice is to run a dedicated syslog server, which receives the data and writes it to disk, and have Splunk monitor those files. This helps with reliability, as a syslog server restart might take less than one second, but restarting Splunk might take up to several minutes. You might loose data that would come in during such an restart - which also happens more often with Splunk instances than with syslog servers.&lt;BR /&gt;
I'd therefore recommend to setup syslog-ng, with encryption enabled, and send your data there.&lt;/P&gt;

&lt;P&gt;Hope that helps - if it does I'd be happy if you would upvote/accept this answer, so others could profit from it. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 12:33:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/391222#M47755</guid>
      <dc:creator>xpac</dc:creator>
      <dc:date>2018-05-15T12:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Setup Secure (Encrypted) Syslog</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/391223#M47756</link>
      <description>&lt;P&gt;Ended up creating certificates and using the following configuration settings in inputs.conf. The key to making this work is the cipherSuite which is not a default cipher.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[tcp-ssl://1518]
sourcetype = pps_log
index = proofpoint
disabled = false
acceptFrom = *comma seperated list of your cluster server IPs*

[SSL]
requireClientCert = false
serverCert = /opt/splunk/etc/apps/TA_pps/local/certs/combined.cer
sslVersions = tls1.2
cipherSuite = AES256-SHA
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The ServerCert should be combined and in the following order:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;-----BEGIN CERTIFICATE----- 
(Your server certificate) 
-----END CERTIFICATE----- 
-----BEGIN CERTIFICATE----- 
(Your Intermediate certificate (if you have one)) 
-----END CERTIFICATE----- 
-----BEGIN RSA PRIVATE KEY----- 
(Your Private Key) 
-----END RSA PRIVATE KEY----- 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Proofpoint will need to load this certificate chain as well.&lt;/P&gt;</description>
      <pubDate>Tue, 29 May 2018 18:01:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/391223#M47756</guid>
      <dc:creator>Kieffer87</dc:creator>
      <dc:date>2018-05-29T18:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: Setup Secure (Encrypted) Syslog</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/391224#M47757</link>
      <description>&lt;P&gt;The proofpoint cloud cluster caches some amount of logs, so a Splunk restart shouldn't result in a loss of logs.&lt;/P&gt;</description>
      <pubDate>Tue, 29 May 2018 18:02:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/391224#M47757</guid>
      <dc:creator>Kieffer87</dc:creator>
      <dc:date>2018-05-29T18:02:27Z</dc:date>
    </item>
    <item>
      <title>Re: Setup Secure (Encrypted) Syslog</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/690574#M80685</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/194725"&gt;@Kieffer87&lt;/a&gt;&amp;nbsp;, I am trying to setup similar ssl on the Splunk Heavy Forward for one of the Vmware application syslog. I have few queries on the above solution you have mentioned.&lt;/P&gt;&lt;P&gt;1. Do we need to have a .cer file or .pem would do?&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; In the .cer/.pem file do we need to include the private key details?&lt;/P&gt;&lt;P&gt;3. Regarding the cipherSuite, do we need to get this from the source application that encrypts the data?&lt;/P&gt;&lt;P&gt;4. We have other default [SSL] config on the same Splunk server so in that case assuming we should use the specific SSL attributes in the [tcp-ssl://&amp;lt;port&amp;gt;] stanza?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2024 02:46:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Setup-Secure-Encrypted-Syslog/m-p/690574#M80685</guid>
      <dc:creator>mannyk1splunk</dc:creator>
      <dc:date>2024-06-13T02:46:44Z</dc:date>
    </item>
  </channel>
</rss>

