The Secure Logging Server manages the flow of information to and from the auditing system. It receives incoming events and requests, logs information to the data store, monitors designated events, and provides filtering and notification services. In addition, you can configure it to automatically reset critical system attributes according to a specified policy.
To specify the logging server, perform the following steps:
Click Auditing.
Specify the following details:
Field |
Description |
---|---|
Audit Messages Using |
Select any one of the following options:
|
Server Listening Address |
Specify the IP address or DNS name of the audit logging server you want to use. By default, the system uses the primary Administration Console IP address. If you want to use a different Secure Logging Server, specify that server here. For example, if you select syslog, specify the syslog server details here. |
NOTE:If you have enabled Analytics Server cluster configuration, the virtual IP address is auto-populated. For information about cluster configuration, see Post-Installation Cluster Configuration for Analytics Server. Access Manager supports auditing through syslog only on TCP. On Windows, if syslog is selected for auditing, the Server Listening Address field is disabled. To specify the server details, manually install and configure the local syslog client. |
|
Server Public NAT Address |
If your auditing server is in the private network, enter Public NAT IP Address of the auditing server using which devices can reach the auditing server. To use a Sentinel server or a Sentinel Log Manager, specify the IP address or DNS name of the Sentinel.
|
Port |
Specify the port that the Platform Agents or syslog uses to connect to the Secure Logging Server.
|
NOTE:If you select Sentinel server for auditing through syslog, then you must use the latest Access Manager Collector for Sentinel. |
|
Stop Service on Audit Server Failure |
Enable this option to stop the Apache services when the audit server is offline or not reachable and audit events could not be cached. |
Management Console Audit Events |
Select the system-wide events you want to audit: Select All: Selects all of the audit events. Health Changes: Generated whenever the health of a server changes. Server Imports: Generated whenever a server is imported into Administration Console. Server Deletes: Generated whenever a server is deleted from Administration Console. Server Statistics: Generated periodically whenever statistics are generated for server. Configuration Changes: Generated whenever you change a server configuration. |
Click OK.
If you did not change the address or port of the Secure Logging Server, this completes the process. It might take up to fifteen minutes for the events you selected to start appearing in the audit files.
(Conditional) If you want to change the IP Address of Analytics Server, you must change the IP Address of the primary Analytics Server. For information about changing the primary IP address, see Section 4.5.4, Managing Details of a Cluster.
(Conditional) If Administration Console is the only Access Manager component installed on the machine and you have changed the address or port of the Secure Logging Server, complete the following steps:
For security reasons, the Novell Audit Configuration file cannot be modified using Administration Console when it is the only Access Manager component on the machine. It can only be edited by a system administrator.
For Administration Console, if syslog is selected for auditing, manually perform the following configuration: (Applicable only on SLES 11 SP4)
In the /etc/sysconfig/syslog file, change the SYSLOG_DAEMON value to rsyslog. This will change the default syslog daemon to rsyslog, if it is currently not the default syslog daemon.
Edit the /etc/rsyslog.d/nam.conf file and specify the following parameters:
Sample nam.conf file:
$InputTCPServerRun 1290 $template ForwardFormat,"<%PRI%>%TIMESTAMP:::date-rfc3164% %HOSTNAME% %syslogtag:1:32%%msg:::sp-if-no-1st-sp%%msg%\n" local0.* @@172.16.50.50:1468;ForwardFormat
This will enable local rsyslog agent to communicate to local TCP port 1290 and forward the audit message to remote server 172.16.50.50 communicating with port 1468.
Restart the local syslog daemon.
Select the audit message format and audit server type by editing the file /etc/Auditlogging.cfg.
Sample Auditlogging.cfg file:
LOGDEST=syslog FORMAT=JSON SERVERIP=127.0.0.1 SERVERPORT=1290
Restart Administration Console.
Open a terminal window, then enter the command for your platform:
Linux: /etc/init.d/novell-ac restart OR rcnovell-ac restart
Windows:
For Administration Console: net stop Tomcat8 net start Tomcat8
For Identity Server and Access Gateway: net stop Tomcat net start Tomcat
To restart syslog, run the following commands:
For SLES 11 SP4: rcrsyslog restart
For SLES 12 SP2: rcsyslog restart
For RHEL 6.9: service rsyslog restart
For RHEL 7.4: systemctl restart rsyslog.service
Restart each device imported into Administration Console.
The devices (Identity Server and Access Gateway) do not start reporting events until they have been restarted.