The syslog-ng Agent for Windows application can read messages from eventlog containers and text files. The following sections explain how to configure these message sources.
For details on how to forward messages from eventlog containers, see the section called “Eventlog sources”.
For details on how to forward messages from plain text log files, see Procedure 5.5, “Managing file sources”.
Some global settings can apply to both types of sources, these are described in Procedure 5.7, “Configuring global settings”.
The syslog-ng Agent for Windows application can collect messages from the standard Windows eventlog containers, as well as from custom containers. The agent automatically forwards the messages from three standard eventlog containers (Application, Security, System
). To enable or disable these sources, or to add custom eventlog containers, complete the following steps:
|
Caution:
Hazard of data loss! It is not recommended to setup archiving for the event container. It is possible to lose logs if there are non-processed events in the event container when the archiving is started. Windows closes and renames the event container and starts a new one regardless of any reading applications. To prevent this, enable mode in the Windows Event Viewer with the following conditions:
|
Procedure 5.1. Managing eventlog sources
Steps:
Start the configuration interface of the syslog-ng Agent for Windows application.
Select
, and double-click on .To disable sending messages from an eventlog container, deselect the checkbox before the name of the container.
To modify the log facility associated with the messages of the container, select the container, click
, and select the log facility to use in the field.Select
, then . To activate the changes, restart the syslog-ng Agent service.Procedure 5.2. Adding eventlog sources
Purpose:
To forward the messages from an eventlog container to your central log server, complete the following steps.
Prerequisites:
You need to know the name of the eventlog container. If you do not know the name of the container, see Procedure 5.3, “Determining the name of a custom eventlog container” or Procedure 5.4, “Determining the name of a custom eventlog container on Windows XP, or Server 2003”.
Steps:
Start the configuration interface of the syslog-ng Agent for Windows application.
Select
, and double-click on .Click *
and ?
wildcard characters in the name of the container. That way you can handle multiple eventlog containers in a single source.
If you use wildcards in the name of the eventlog container, note the following points:
If none of the existing eventlog containers match the pattern, the syslog-ng Agent will send a warning message into the debug log. For details on enabling debug logs, see the section called “Debugging syslog-ng Agent”.
The syslog-ng Agent application checks for new eventlog containers only when it starts or restarts. If a new eventlog container is created with a name that matches the pattern of an eventlog source, restart the syslog-ng Agent service.
|
Caution:
Hazard of data loss! If you use wildcards in multiple eventlog source names, make sure that only one pattern matches every container name. If two eventlog sources match the same container, syslog-ng Agent might ignore the messages of the eventlog container. |
Click
, then . To activate the changes, restart the syslog-ng Agent service.Expected result:
The syslog-ng Agent application starts sending new messages from the newly added eventlog container. Note that the syslog-ng Agent will send existing messages from the eventlog container only if you have selected the
option.Procedure 5.3. Determining the name of a custom eventlog container
Purpose:
To determine the name of a custom eventlog container, complete the following steps.
Steps:
Open the Event Viewer application.
Select the custom container you are looking for (for example DNS Server
).
Right click on the container and select
.The name of the container is the name of the file (without the extension) displayed in the C:\WINDOWS\system32\winevt\Logs\Security.evtx
it is Security
).
Use this name as the name of the custom eventlog container during the procedure described in Procedure 5.1, “Managing eventlog sources”.
Procedure 5.4. Determining the name of a custom eventlog container on Windows XP, or Server 2003
Purpose:
To determine the name of a custom eventlog container on Windows XP, or Server 2003, complete the following steps.
Steps:
On the client host select
.Navigate to DFS Replication
, File Replication Service
, DNS Server
.
Use this name as the name of the custom eventlog container during the procedure described in Procedure 5.1, “Managing eventlog sources”.
Procedure 5.5. Managing file sources
Purpose:
The syslog-ng Agent for Windows application can collect log messages from text files. It can process messages spanning multiple lines, and supports the use of wildcards (*
, ?
) in filenames to be able to follow log files that are automatically rotated. Note that every line of the file that ends with a newline character is considered a separate message. However, if a file contains only a single line that does not end with a newline character, syslog-ng Agent will not process the line.
To configure file sources, complete the following steps:
|
Caution:
If an application deletes a log file, the application must ensure that syslog-ng Agent had enough time to forward the messages from the file to the central server to avoid losing messages. |
Example 5.1. Collecting the logs of multiple applications from a single folder
If two applications log into the same folder (for example C:\logs
), you have to create two file sources. For example, if the name of the log files is application1-*.log
and application2-*.log
, respectively, then create two file sources with the C:\logs
Base Directory, but with different File Name Filter: application1-*.log
and application2-*.log
, respectively.
If other applications log into the C:\logs
folder, add a separate expression for each application.
By default, the syslog-ng Agent will send every message to the server that arrives into any of the monitored log files.
Steps:
Start the configuration interface of the syslog-ng Agent for Windows application.
Select
, double-click on , and check the option.Select
, and select the folder containing the log files in the field. Select or enter the name and extension of the log files in the field. Wildcards can be used. The syslog-ng Agent will forward log messages from every file that is located in this folder and has a name that matches the filter expression.
|
Caution:
If you use wildcards in multiple file sources, make sure that the files and folders that match the wildcards do not overlap. That is, every file and folder should belong to only one file source. Monitoring a file from multiple wildcard sources can lead to data loss. |
|
TIP:
When specifying the Base Directory, you can use the environment variables of Windows, for example |
|
Caution:
Note that when managing members of a domain, the selected path must be available on the domain members, for example |
To send messages from the files located in the subfolders of the folder set as Base Directory, select the
option.To change the log facility or the log severity associated to the file source, select the desired facility or priority from the
or fields, respectively.
|
NOTE:
Significant changes to the settings of a file source can cause the syslog-ng Agent to resend the entire contents of the matching files. This means that log messages already sent earlier to the syslog-ng server may be resent and thus duplicated in the server logs. Configuration changes that can result in such behavior are:
|
Optional Step: By default, the syslog-ng Agent application starts sending messages from the beginning of the file. If you only want to send the messages that are newly added to the file, deselect the option.
|
NOTE:
Be careful when is disabled. If a new file(s) is created while syslog-ng Agent is stopped, the content of this file will not be forwarded, only the new records. To avoid message loss, never disable in the configuration. |
Optional Step: By default, the operating system notifies the syslog-ng Agent application when an application modifies a logfile. However, in some cases this does not happen, because the file-monitoring API of Windows does not notice that the file has changed, for example, when monitoring logfiles of the Windows DHCP service.
In such case, select the
option. Note that enabling this option decreases the performance of syslog-ng Agent if you monitor lots of logfiles.By default, the syslog-ng Agent application assumes that the source files are encoded using the default windows ANSI code page, specific to the locale of the host. If the files have a different encoding, select it from the
field. Note that the log messages are sent to the destinations using UTF-8 encoding.If a log messages in the log file consists of multiple lines, that is, the log messages contain newline characters, configure syslog-ng Agent to process the related lines as a single message.
The syslog-ng Agent application can automatically handle Apache Tomcat Catalina and Oracle SQL log messages. To process such messages, select the name of the application from the
field. Note that the timestamp of Tomcat log messages depends on the locale of the host. The syslog-ng Agent for Windows application automatically removes the last CRLF control character from multi-line messages.To process multi-line log messages of a different application, complete the following steps.
Select
, and set the and optionally the fields.Specify a string or regular expression that matches the beginning of the log messages in the
field. If the option is set, the syslog-ng Agent ignores newline characters from the source until a line matches the regular expression again, and treats the lines between the matching lines as a single message.
|
NOTE:
Use as simple regular expressions as possible, because complex regular expressions can severely reduce the rate of processing multi-line messages. |
Use the
option when processing multi-line messages that contain unneeded parts between the messages. Specify a string or regular expression that matches the beginning of the unneeded message parts. If the option is set, the syslog-ng Agent ignores lines between the line matching the expression and the next line matching .When receiving multi-line messages from a source when the
option is set but no matching line is received between two lines that match , the syslog-ng Agent application will continue to process the incoming lines as a single message until a line matching is received.
|
Caution:
If the option is set, the syslog-ng Agent application discards lines between the line matching the and the next line matching expressions. |
Optional Step: After creating and testing a custom pattern, please consider sending your pattern to One Identity so we can include it in a future version of syslog-ng Agent. To share your pattern with One Identity and other syslog-ng Agent users, click . Your e-mail application will open, with an e-mail containing the application name and the pattern.
Select
, then . To activate the changes, restart the syslog-ng Agent service.Procedure 5.6. Managing the internal source
Purpose:
All messages generated internally by syslog-ng Agent for Windows application use the internal source. The syslog-ng Agent for Windows application can forward messages originating from the internal source to certain destinations. To configure the internal source, complete the following steps:
Steps:
Select
and double-click on .Enable
.Navigate to
.Select the internal message types to forward to the
, or to (meaning all servers that are configured as normal TCP destinations). The message types correspond to the respective message severities. The default setting is internal error and warning messages forwarded to , and info messages forwarded to .Only the selected message types will be forwarded.
|
Caution:
If the same message types are selected for both the and the , and the application event container is also a source, messages can be duplicated. |
|
NOTE:
These options will be inherited from GPOs (Group Policy Objects). For details, see the section called “Domain versus local settings”. They can also be exported/imported from an XML configuration also. |
Click
.Procedure 5.7. Configuring global settings
Purpose:
The syslog-ng Agent for Windows application has some global settings that can apply to both eventlog and file sources. To configure the global settings, complete the following procedure:
Steps:
Start the configuration interface of the syslog-ng Agent for Windows application.
Select
and double-click on .Set the default log facility associated to the messages.
By default, the filters and regular expressions (see Chapter 7, Filtering messages) used in the message filters are case-sensitive. To make them case-insensitive, select the or the options, or both.
Select
, then . To activate the changes, restart the syslog-ng Agent service.Procedure 5.8. Configuring the hostname format
Purpose:
The syslog-ng Agent for Windows application can send the hostname macro in different format types (FQDN or short hostname), depending on the domain membership of the host, and the source of the message (eventlog or file). The hostname settings will affect all logs originating from file sources, eventlog sources, as well as MARK messages and internal messages of syslog-ng Agent, for example, start/stop messages.
To prevent using two host licenses from a trusted source, use the same hostname type in every outgoing message.
To determine the hostname, syslog-ng Agent queries the short hostname of the machine at startup, and then attempts to resolve it from the DNS server to receive the FQDN. If DNS resolution is not possible, the hostname will be the short hostname.
|
NOTE:
The syslog-ng Agent will never rewrite hostnames. |
To configure the hostname format globally, complete the following steps:
Steps:
Select
and double-click on .Enable
.Navigate to
.Select the hostname type to use globally.
To use only the short hostname in the $HOST
macro of the outgoing message, select . This is the default setting.
In case of file sources, MARK messages and internal messages of syslog-ng Agent the outgoing hostname will be the short hostname of the machine.
In case of eventlog sources, the hostname will be the short hostname of the event message (for example mypc
), or syslog-ng Agent will cut the domain name from the FQDN and use the short hostname part (for example mypc.mycompany.local
becomes mypc
).
To use FQDN (hostname.domain_name
) in the $HOST
macro of the outgoing message, select .
In case of file sources, MARK messages and internal messages of syslog-ng Agent, the hostname will be the FQDN of the machine.
|
NOTE:
If there is no DNS server, or the DNS server cannot resolve the hostname, only the simple hostname of the machine will be used. |
In case of eventlog sources, if the hostname of event message is already an FQDN, syslog-ng Agent will use it as the hostname (for example mypc.mycompany.local
will be used as such). If this is not an FQDN, syslog-ng Agent will try to resolve this hostname and use the received FQDN as hostname (for example mypc
becomes mypc.mycompany.local
).
|
NOTE:
If there is no DNS server, or the DNS server cannot resolve the hostname, only the short hostname of the event message will be used. |
To use a custom domain name that will be appended after the short hostname to receive the FQDN, select
and enter the domain name to append to the short hostname in the field below. This option affects every outgoing message: eventlog sources, file sources, MARK messages and internal messages of syslog-ng Agent.If the hostname is a short hostname, the custom domain name will be appended after the hostname (for example mypc
becomes mypc.customcompany.local
).
If the hostname is an FQDN, the domain name part will be replaced with the custom domain name (for example if the FQDN in the forwarded message is mypc.mycompany.local
and the custom domain name is customcompany.local
, the hostname in the outgoing message becomes mypc.customcompany.local
).
|
NOTE:
The hostname still can be different in the outgoing messages if in the eventlog message, the hostname in the event is different from the machine hostname:
|
To use lower-case characters in every hostname, enable
. This is enabled by default. When disabled, mixed lower-case and upper-case characters (if there is any) will be used in hostnames. This option affects every outgoing message: eventlog sources, file sources, MARK messages and internal messages of syslog-ng Agent.Click
.Procedure 5.9. Disabling sources and filters globally
Purpose:
Filters and sources can be disabled globally as well. Disabling filters or sources means that the syslog-ng Agent ignores the disabled settings: that is, if the file sources are disabled, the agent does not send the messages from the files to the server. For details, see the following procedure.
Steps:
Start the configuration interface of the syslog-ng Agent for Windows application.
To disable eventlog sources, select
, right-click on , then select .To disable file sources, select
, right-click on , then select .To disable eventlog filters, select
, right-click on , then select .To disable file filters, select
, right-click on , then select .Select
, then . To activate the changes, restart the syslog-ng Agent service.When connecting to a syslog-ng server using an encrypted connection, the syslog-ng Agent for Windows verifies the certificate of the server. The connection can be established only if the syslog-ng Agent for Windows can verify the certificate of the syslog server. For this, import one of the following certificates into the Certificate Store (
) of the Windows-based host:The certificate of the Certificate Authority (CA) that issued the certificate of the server
If your server uses a self-signed certificate, import the self-signed certificate
For details on importing certificates, see Procedure 6.3, “Importing certificates with the Microsoft Management Console”.
|
NOTE:
This certificate (sometimes also called the CACert of the server) is not the certificate of the server: it is the certificate of the CA that signed the certificate of the server. |
Procedure 6.1. Enabling encrypted connections
Purpose:
To enable SSL-encrypted connections to the server, complete the following steps:
Steps:
Start the configuration interface of the syslog-ng Agent for Windows application.
Select
.Right-click on the server that accepts encrypted connections and select
.Select the
option.
|
Caution:
The connection is established only if the syslog-ng Agent for Windows can verify the certificate of the syslog server. For this, import one of the following certificates into the Certificate Store ( ) of the Windows-based host:
For details on importing certificates, see Procedure 6.3, “Importing certificates with the Microsoft Management Console”. |
Click
.To compress the messages during transfer to save bandwidth, select the
option. Note that for syslog-ng Agent to actually use compression, the following points must be met.The
option must be enabled.You must use SSL and/or RLTP to send messages to the logserver (that is, at least one of the
or options must be enabled.The logserver must be configured to enable compression. If the logserver is syslog-ng PE the proper allow-compress()
option must be enabled in the source. If the logserver is syslog-ng Store Box, enable the option. Note that to send compressed messages to syslog-ng Store Box, you must use the RLTP™ protocol (for details, see the syslog-ng Documentation page).
Select
, then . To activate the changes, restart the syslog-ng Agent service.When the syslog-ng server is configured to use mutual authentication, it requests a certificate from the syslog-ng clients. The syslog-ng Agent application can automatically show the requested certificate to the server when the connection is established, provided it is available in the Procedure 6.3, “Importing certificates with the Microsoft Management Console”.
store ( ) of the Local Computer. Use the to import this certificate. For details, seeProcedure 6.2. Configuring mutual authentication with the syslog-ng Agent for Windows
Purpose:
If the syslog-ng server requests authentication from the syslog-ng Agent, complete the following steps.
Steps:
Create certificates for the clients. By default, the syslog-ng Agent will look for a certificate that contains the hostname or IP address of the central syslog-ng server in its Common Name. If you use a different Common Name, do not forget to complete Step 3 to set the Common Name of the certificate.
The certificate must contain the private key and must be in PKCS12 format.
|
TIP:
To convert a certificate and a key from PEM format to PKCS12 you can use the following command: openssl pkcs12 -export -in agentcertificate.pem -inkey agentprivatekey.pem -out agentcertificatewithkey.pfx |
Import this certificate into the Procedure 6.3, “Importing certificates with the Microsoft Management Console”.
store of the Local Computer using the Certificate Import Wizard. For details, seeBy default, the syslog-ng Agent will look for a certificate that contains the hostname or IP address of the central syslog-ng server in its Common Name. (The agent will look for the server name or address set in the
field of the destination.) If the certificate of the client has a different Common Name, complete the following steps:Start the configuration interface of the syslog-ng Agent for Windows application.
Select
.Right-click on the server that requires mutual authentication and select
.Select the
option, click , then select the certificate to use. You can also type the Common Name of the certificate into the field.If you have more than one certificates with the same Common Name, alternatively, you can type the Distinguished Name (DN) of the certificate into the US, Maryland, Pasadena, Example Inc, Sample Department, mycommonname
Select
, then . To activate the changes, restart the syslog-ng Agent service.Procedure 6.3. Importing certificates with the Microsoft Management Console
Purpose:
To import a certificate, complete the following steps.
Steps:
Start Microsoft Management Console by executing mmc.exe
( menu ).
|
NOTE:
Running |
Click on the
item of the menu.Click
, select the module, and click .Select
in the displayed window and click .Select
and click .To import the CA certificate of the syslog-ng server's certificate, navigate to
.To import a certificate for the syslog-ng Agent to perform mutual authentication, navigate to
.Right-click on the
folder and from the appearing menu select . The will be displayed. Click .Optional step: Certificates used to authenticate the syslog-ng Agent in mutual authentication include the private key. Provide the password for the private key when requested.
Windows offers a suitable certificate store by default, so click
.Click
on the summary window and on the window that marks the successful importing of the certificate.The syslog-ng Agent for Windows application can filter log messages both in blacklist- and whitelist fashion. When using blacklisting, you can define filters, and any message that matches the filters is ignored by the agent — only messages that do not match the filters are sent to the central server. When using whitelisting, you can define filters, and the messages matching the filters are forwarded to the central server — other messages are ignored. By default, blacklist filtering is used.
If you define multiple filters, the messages must match every filter. In other words, the filters are connected to each other with logical AND operations.
Different filters are available for eventlog- and file sources. When the syslog-ng Agent processes a message, it checks the relevant filters one-by-one: for example if it finds a blacklist filter that matches the message, the agent stops processing the message without sending it to the server.
|
NOTE:
By default, all filters are case sensitive. For details on how to change this behavior, see Procedure 5.7, “Configuring global settings”. |
For details on how to filter messages received from eventlog sources, see Procedure 7.1, “Filtering eventlog messages”.
For details on how to filter messages received from file sources, see Procedure 7.2, “Filtering file messages”.
For details on how to disable filtering globally, see Procedure 5.9, “Disabling sources and filters globally”.
Procedure 7.1. Filtering eventlog messages
Purpose:
The following types of filters are available for eventlog sources. Unless described otherwise, the filters match only if the same string appears in the related field of the message.
|
NOTE:
When filtering on the message source, the values of the |
Sources: Filter on the source (application) that created the message. Corresponds with the EVENT_SOURCE
macro.
Sources and Event ID: Filter on the source (application) that created the message, and optionally on the identification number of the event. Corresponds with the EVENT_SOURCE
and EVENT_ID
macros.
Message Contents: Filter the text of the message, that is, the contents of the EVENT_MESSAGE
macro. In this filter you can use regular expressions.
Sources and Categories: Filter on the source (application) that created the message, and optionally on the category of the event. Corresponds with the EVENT_SOURCE
and EVENT_CATEGORY
macros.
Users: Filter on the username associated with the event. Corresponds with the EVENT_USERNAME
macro.
Computers: Filter on the name of the computer (host) that created the event. Corresponds with the HOST
macro.
Event Types: Filter on the type of the event. Corresponds with the EVENT_TYPE
macro.
To modify the filters used for eventlog messages, complete the following procedure:
Steps:
If you want to filter on the source of the message, complete the following steps.
Start the Event Viewer application and find a message from the source that you want to filter.
Select the
tab, and right-click on the value of the field.Select
. Save the saved value somewhere, you will need it later to configure the filter in syslog-ng Agent.
|
NOTE:
It is important to use this method, because the actual value of the Source field can be longer than what the Event Viewer displays. (For example, for security messages, the displayed source is often Hovering your mouse over the value of the Source field also displays the full name of the source. |
Start the configuration interface of the syslog-ng Agent for Windows application.
To apply filters globally to every eventlog message, select
, and right-click .To apply filters only to a specific destination, select
, select the destination server, then select . Right-click .
|
NOTE:
If you want to use both global and local (server side) filtering, first global filters will be applied to the eventlog messages and then the local filters. |
Select
.To use whitelist-filtering, select
. By default, syslog-ng Agent uses blacklist filtering.On the right-hand pane, double-click on the type of filter you want to create.
To ignore messages sent by a specific application, or messages of the application with a specific event ID, double-click on
, select , and enter the name of the source (application) whose messages you want to ignore into the field. To ignore only specific messages of the application, enter the ID of the event into the field. Select .To ignore messages that contain a specific string or text, double-click on
, enter the search term or a POSIX regular expression into the field, then select .To ignore messages sent by a specific application, or messages of the application that fall into a specific category, double-click on
, select , and select the name of the application whose messages you want to ignore from the field. To ignore only those messages of the application that fall into a specific category, enter the name of the category into the field. Select .To ignore messages sent by a specific user, double-click on
, enter the name of the user into the field, then select .To ignore messages sent by a specific computer (host), double-click on
, enter the name of the user into the field, then select .Event Types: To ignore messages of a specific event-type, double-click on , select the event types to ignore, and select .
Select
, then . To activate the changes, restart the syslog-ng Agent service.Procedure 7.2. Filtering file messages
Purpose:
The following types of filters are available for file sources:
Message Contents: Filter the text of the message, that is, the contents of the FILE_MESSAGE
macro. In this filter you can use regular expressions.
File Name: Filter on the file name. Corresponds with the FILE_NAME
macro. In this filter you can use wildcards (*
, ?
). Only available for destination file filters.
To modify the filters used for file messages, complete the following procedure:
Steps:
Start the configuration interface of the syslog-ng Agent for Windows application.
To apply filters globally to every file message, select
, and right-click .To apply filters only to a specific destination, select
, select the destination server, then select . Right-click .
|
NOTE:
If you want to use both global and local (server side) filtering, first global filters will be applied to the file messages and then the local filters. |
Select
.To use whitelist-filtering, select
. By default, syslog-ng Agent uses blacklist filtering.On the right-hand pane, double-click on the type of filter you want to create.
To ignore messages that contain a specific string or text, double-click on
, enter the search term or a regular expression into the field, then select .Select
, then . To activate the changes, restart the syslog-ng Agent service.The format of the messages received from the eventlog and the file sources can be customized using templates. You can define separate message format for the eventlog and the file sources. If you have multiple destination servers configured, you can define separate templates for each server. When creating a template to customize the message format, you can use macros, all alphanumeric characters, and the following special characters: <>,():;-+/_
.
By default, syslog-ng Agent uses the following templates to forward messages:
For the BSD protocol: <${PRI}>${BSDDATE} ${HOST} ${MSGHDR}${MESSAGE}
For messages read from the eventlog, the $MESSAGE
part is ${EVENT_USERNAME}: ${EVENT_NAME} ${EVENT_SOURCE}: [${EVENT_TYPE}] ${EVENT_MSG} (EventID ${EVENT_ID})
for every protocol.
For messages read from a file, the $MESSAGE
part is $FILE_NAME: $FILE_CURRENT_POSITION/$FILE_SIZE: $FILE_MESSAGE
for every protocol.
Procedure 8.1. Customizing messages using templates
Purpose:
To create a template, complete the following procedure:
|
Caution:
These macros are available only in the syslog-ng Agent for Windows. To recognize Windows-specific elements of the log message (for example eventlog-related macros) on the syslog-ng server, you have to use parsers on the syslog-ng server. The parser must be configured to match the message format set in the syslog-ng Agent. |
Steps:
Start the configuration interface of the syslog-ng Agent for Windows application.
Select
. Select your log server, and click .To change the format of messages received from eventlog sources, type the message format you want to use into the
field.To change the format of messages received from file sources, type the message format you want to use into the
field.Do not forget to add the $
character before macros. For a complete list of the available macros, see the section called “Macros available in the syslog-ng Agent”.
For example, to send the messages in the DATE HOSTNAME MESSAGE
format, type Date:$DATE Hostname:$HOST Logmessage:$MESSAGE
.
Note that the $MESSAGE macro contains not only the text of the log message, but also additional information received from the message source, such as the name of the eventlog container, or the file, as set in the eventlog-specific and file-specific templates.
|
NOTE:
Templates are assigned to a single destination server, so it is possible to use different templates for different servers. However, a server and its failover servers always receive the same message. |
|
Caution:
If you have more than one destination servers configured (separate servers, not in failover mode), and you want to use the same template for every server, you must manually copy the template into the configuration of each server. Template modifications are not applied automatically to every server. |
Click
.To activate the changes, restart the syslog-ng Agent service.
The syslog-ng Agent can send the syslog messages using either the ISO or the BSD timestamp format. It is recommended to use the ISO format, because it contains much more information than the BSD format.
Note that in the syslog-ng Agent, the macros without prefix (for example DATE
) always refer to the receiving date of the message (for example R_DATE
) when it arrived into the event log container, and are included only for compatibility reasons.
© 2023 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy