登录请求

Continue

享有维护服务的产品支持表单

暂时无法在支持网站上提交享有定期维护的产品表单。 如果您需要我们立即提供帮助,请与技术支持部门联系。 对于由此给您带来的不便,我们深表歉意。

继续
立即与支持人员聊天
与支持团队交流
  • 获得即时帮助

  • 完成注册

    登录

    请求定价

    联系销售人员

请选择您的产品:

您已选择一个产品捆绑包。 您能否选择单个产品以便我们更好地满足您的请求。 *

技术支持工程师目前正忙,无法回应您的消息。 如果需要即时服务,请通过我们的服务请求表提交请求。

为向您提供更好的服务,请填写'Purpose of your Chat'(联系目的):
剩余2000个字符

针对您的问题建议的解决方案

以下文章可根据您的描述解决您的问题。

未找到结果
关闭 开始联系
image.logo.print
image.logo
  • 产品
    • 查看所有产品
    • ActiveRoles
    • Cloud Access Manager
    • Defender
    • Enterprise Single Sign-on
    • Identity Manager
    • Identity Manager Data Governance
    • Password Manager
    • Privileged Access Suite for Unix
    • Starling Two Factor Authentication
  • 解决方案
    • 查看所有解决方案
    • Identity Governance
    • Privileged Management
    • Access Management
    • Identity as a Service
  • 服务
    • 专业服务
    • One Identity University
    • 支持服务
  • 支持
    • 按产品线
      • 所有产品
      • Active Roles
      • Safeguard Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM
    • 联系我们
      • 所有
      • 客户服务
      • 获得许可 帮助
      • 续订帮助
      • 技术支持
    • 下载软件
    • 知识库
    • 我的帐户
      • 我的产品
      • 我的服务请求
      • 我的许可证
      • 我的组
      • 我的个人资料
    • 政策和规程
    • 咨询服务
    • 技术说明文件
    • One Identity University
    • 用户论坛
    • 视频教程
    • 支持主页
  • 试用版
  • 合作伙伴
  • 社区
登录
  • 打印
  • 我的下载 ()
  • 支持
  • 技术说明文件
  • syslog-ng Store Box 6.10.0
  • syslog-ng Store Box 6.10.0 - Administration Guide

syslog-ng Store Box 6.10.0 - Administration Guide

内容导航  
Preface Introduction
What SSB is What SSB is not Why is SSB needed Who uses SSB
The concepts of SSB
The philosophy of SSB Collecting logs with SSB Managing incoming and outgoing messages with flow-control Receiving logs from a secure channel Advanced Log Transfer Protocol Network interfaces High Availability support in SSB Firmware in SSB
Firmware and high availability
Versions and releases of SSB Licensing model and modes of operation
Notes about counting the licensed hosts
Licensing benefits License types
Perpetual license Subscription-based license
Licensing examples The structure of a log message
BSD-syslog or legacy-syslog messages
The PRI message part The HEADER message part The MSG message part
IETF-syslog messages
The PRI message part The HEADER message part The STRUCTURED-DATA message part The MSG message part
The Welcome Wizard and the first login
The initial connection to SSB
Creating an alias IP address (Microsoft Windows) Creating an alias IP address (Linux) Modifying the IP address of SSB
Configuring SSB with the Welcome Wizard
Configuring SSB as a standalone unit, or as the primary node of a HA cluster Configuring your SSB unit as the secondary node of a HA cluster
Basic settings
Supported web browsers The structure of the web interface
Elements of the main workspace Multiple web users and locking Web interface and RPC API settings
Network settings
Configuring the external interface Configuring the management interface Configuring the routing table
Date and time configuration
Configuring a time (NTP) server
SNMP and e-mail alerts
Configuring e-mail alerts Configuring SNMP alerts Querying SSB status information using agents View node ID and community
Configuring system monitoring on SSB
Configuring SNMP agent settings Health monitoring Preventing disk space fill up Configuring message rate alerting System related traps Alerts related to syslog-ng
Data and configuration backups
Creating a backup policy using Rsync over SSH Creating a backup policy using SMB/CIFS Creating a backup policy using NFS Creating configuration backups Creating data backups Encrypting configuration backups with GPG
Archiving and cleanup
Creating a cleanup policy Creating an archive policy using SMB/CIFS Creating an archive policy using NFS Archiving or cleaning up the collected data
User management and access control
Managing SSB users locally
Creating local users in SSB Deleting a local user from SSB
Setting password policies for local users Managing local usergroups Managing SSB users from an LDAP database Authenticating users to a RADIUS server Authenticating users via OpenID Connect Managing user rights and usergroups
Assigning privileges to usergroups for the SSB web interface Modifying group privileges Finding specific usergroups How to use usergroups Built-in usergroups of SSB
Listing and searching configuration changes
Managing SSB
Controlling SSB: restart, shutdown Managing a high availability SSB cluster
Adjusting the synchronization speed Asynchronous data replication Redundant heartbeat interfaces Next-hop router monitoring
Upgrading SSB
Upgrade checklist Upgrading SSB Upgrading an SSB cluster Troubleshooting Updating the SSB license Monthly license host usage report Exporting the configuration of SSB Importing the configuration of SSB
Accessing the SSB console
Using the console menu of SSB Enabling SSH access to the SSB host Changing the root password of SSB
Sealed mode
Disabling sealed mode
Out-of-band management of SSB
Configuring the IPMI interface from the console Configuring the IPMI interface from the BIOS
Managing the certificates used on SSB
Generating certificates for SSB Uploading external certificates to SSB Generating TSA certificate with Windows Certificate Authority on Windows Server 2008 Generating TSA certificate with Windows Certificate Authority on Windows Server 2012
Creating hostlist policies
Creating hostlists Importing hostlists from files
Configuring message sources
Default message sources in SSB Creating new message sources in SSB
Configuring your own, customized Syslog type message source
Configuring the Listening address and Listening port for your Syslog type message source Configuring the Transport options for your Syslog type message source Configuring the Hostname and timestamp-related settings for your Syslog type message source Configuring the Monitoring settings for your Syslog type message source Customizing encoding for your Syslog type message source
Configuring your own, customized SQL type message source
Setting up and testing the SQL database connection of your SQL type message source Customizing fetching messages when using your SQL type message source
Customizing the fetch query for your SQL type message source Customizing the fetch history settings for your SQL type message source
Configuring the fetching frequency settings for your SQL type message source Configuring the Monitoring settings for your SQL type message source
Receiving SNMP messages
Storing messages on SSB
Using logstores
Creating logstores Configuring the indexer service Viewing encrypted logs with logcat
Creating text logspaces Managing logspaces
Managing logspaces - Archive and backup logspaces Assigning the SSB logspace of your choice to a custom cloud service provider data disk
Creating filtered logspaces Creating remote logspaces Creating multiple logspaces Accessing log files across the network
Sharing log files in standalone mode Sharing log files in Domain mode Accessing shared files
Managing custom cloud service provider data disks for your logspaces in SSB
Possible use cases and scenarios for using custom cloud service provider data disks with SSB Adding a new custom cloud service provider data disk to your SSB configuration
Adding a new custom cloud service provider data disk on the cloud service provider side
Adding a new Microsoft Azure-managed disk as a custom cloud service provider data disk on the Microsoft Azure Portal side Adding an additional disk in VMware ESXi as a custom cloud service provider data disk on the vSphere Client side
Adding a new custom cloud service provider data disk to your SSB configuration on the SSB side
Data disk information for your custom cloud service provider data disks
Removing a custom cloud service provider data disk from your SSB configuration Increasing the size of a custom cloud service provider data disk that you use in your SSB configuration
Forwarding messages from SSB
Forwarding log messages to SQL databases SQL templates in SSB
The Legacy template The Full template The Custom template
Forwarding log messages to remote servers Forwarding log messages to the Microsoft Azure Sentinel cloud
Prerequisites Limitations Configuring the Azure Sentinel destination: adding a new Azure Sentinel destination
Configuring the Azure Sentinel destination: Authentication and workspace settings Configuring the Azure Sentinel destination: Advanced message parameters Configuring the Azure Sentinel destination: Performance-related settings
Forwarding log messages to Google Pub/Sub
Prerequisites Limitations Configuring the Google Pub/Sub destination: adding a new Google Pub/Sub destination
Configuring the Google Pub/Sub destination: Authentication and workspace settings Configuring the Google Pub/Sub destination: Advanced message parameters Configuring the Google Pub/Sub destination: Performance-related settings
Forwarding log messages to Splunk
Prerequisites Limitations Transport settings for the Splunk destination HTTP connection settings HTTPS connection settings JSON message body Performance-related settings
Forwarding log messages to HDFS destinations
Configuring a Kerberos policy Configuring the HDFS cluster Configuring an HDFS destination
Log paths: routing and processing messages
Default logpaths in SSB Creating new log paths Filtering messages Replace message parts or create new macros with rewrite rules Find and replace the text of the log message Parsing sudo log messages Parsing key-value pairs
Configuring syslog-ng options
General syslog-ng settings Time stamping configuration on SSB Using name resolution on SSB Setting the certificates used in TLS-encrypted log transport
Searching log messages
Using the search interface
Customizing columns of the log message search interface Metadata collected about log messages Using complex search queries
Browsing encrypted logspaces
Using persistent decryption keys Using session-only decryption keys Assigning decryption keys to a logstore
Creating custom statistics from log data
Displaying log statistics Creating reports from custom statistics
Creating content-based alerts
Setting up alerts on the search interface Setting up alerts on the Search > Content-Based Alerts page Format of alert messages
Additional tools
Searching the internal messages of SSB
Using the internal search interfaces
Filtering Exporting the results Customizing columns of the internal search interfaces
Changelogs of SSB Configuration changes of syslog-ng peers Log message alerts Notifications on archiving and backups Status history and statistics
Displaying custom syslog-ng statistics Statistics collection options
Reports
Contents of the default reports Generating partial reports Configuring custom reports
Classifying messages with pattern databases
The structure of the pattern database How pattern matching works Searching for rulesets Creating new rulesets and rules Exporting databases and rulesets Importing pattern databases Using pattern parsers Using parser results in filters and templates Using the values of pattern parsers in filters and templates
The SSB RPC API
Requirements for using the RPC API RPC client requirements Documentation of the RPC API
Monitoring SSB
Monitoring SSB's disk Monitoring SSB's memory Monitoring SSB's CPU
Monitoring CPU load Monitoring CPU load averages Monitoring CPU usage
Monitoring SSB's I/O Monitoring SSB statistics Monitoring the HA cluster Monitoring hardware RAID
StorCLI's PD LIST (Physical Drive) StorCLI's Drive State StorCLI's VD LIST (Virtual Drive)
Monitoring software RAID Monitoring web server, root CA and TSA certificates
Troubleshooting SSB
Locating the SSB appliance in the server room Network troubleshooting Gathering data about system problems Viewing logs on SSB Collecting logs and system information for error reporting Troubleshooting an SSB cluster
Understanding SSB cluster statuses Recovering SSB if both nodes broke down Recovering from a split brain situation Replacing a node in an SSB HA cluster Resolving an IP conflict between cluster nodes
Restoring SSB configuration and data Configuring the IPMI interface from the BIOS after losing IPMI password Incomplete TSA response received Correct Alerting & Monitoring and Management group privilege mismatch
Security checklist for configuring SSB Glossary
  • Viewing Topics 297 - 297 of 297

Glossary

Glossary
alias IP
An additional IP address assigned to an interface that already has an IP address. The normal and alias IP addresses both refer to the same physical interface.
auditing policy
The auditing policy determines which events are logged on host running Microsoft Windows operating systems.
authentication
The process of verifying the authenticity of a user or client before allowing access to a network system or service.
BSD-syslog protocol
The old syslog protocol standard described in RFC 3164. Sometimes also referred to as the legacy-syslog protocol.
CA
A Certificate Authority (CA) is an institute that issues certificates.
Cadence
[[[Undefined variable TemplateGuideVariables.OneIdentityNameShort]]] font that contains standard icons used in the user interfaces for various [[[Undefined variable TemplateGuideVariables.OneIdentityNameShort]]] products.
certificate
A certificate is a file that uniquely identifies its owner. Certificates contains information identifying the owner of the certificate, a public key itself, the expiration date of the certificate, the name of the CA that signed the certificate, and some other data.
certificate chain
An ordered list of certificates, containing an end-user subscriber (or server) certificate and intermediate certificates (that represent the intermediate CAs). A certificate chain enables the receiver to verify that the sender and all intermediate certificates are trustworthy.
client mode
In client mode, syslog-ng collects the local logs generated by the host and forwards them through a network connection to the central syslog-ng server or to a relay.
destination
A named collection of configured destination drivers.
destination driver
A communication method used to send log messages.
destination, local
A destination that transfers log messages to a logspace.
destination, local
A destination that transfers log messages within the host, for example writes them to a file, or passes them to a log analyzing application.
disk buffer
The Premium Edition of syslog-ng can store messages on the local hard disk if the central log server or the network connection to the server becomes unavailable.
disk queue
See disk buffer.
domain name
The name of a network, for example: balabit.com.
Drop-down
Flare default style, that can be used to group content within a topic. It is a resource to structure and collapse content especially in non-print outputs.
External network interface
The external interface (labeled 1 or EXT) is used for general communication between the clients and the servers. If the management interface is not configured, the external interface is used for management purposes as well.
filter
An expression to select messages.
filtered logspace
The filtered subset of logs contained in an existing local, remote, or multiple logspace. A filtered logspace is created by using the same search expressions and logic as on the Search interface. See also multiple logspace and remote logspace.
firmware
A firmware is a collection of the software components running on SSB. Individual software components cannot be upgraded on SSB, only the entire firmware. SSB contains two firmwares (an external (or boot) firmware, and an internal (or core) firmware). These are bundled into a single ISO file.
gateway
A device that connects two or more parts of the network, for example: your local intranet and the external network (the Internet). Gateways act as entrances into other networks.
Glossary
List of short definitions of product specific terms.
HA network interface
The HA interface (labeled 4 or HA) is an interface reserved for communication between the nodes of SSB clusters.
High Availability
High Availability (HA) uses a second SSB unit (called slave node) to ensure that the services are available even if the first unit (called master node) breaks down.
host
A computer connected to the network.
hostname
A name that identifies a host on the network.
ICA
The base protocol of Citrix products (default port tcp/1494). It does desktop or application remoting through TCP or other network protocols. Independent Computing Architecture (ICA) is a proprietary protocol for an application server system, designed by Citrix Systems. The protocol lays down a specification for passing data between server and clients, but is not bound to any one platform. ICA is broadly similar in purpose to window servers such as the X Window System. It also provides for the feedback of user input from the client to the server, and a variety of means for the server to send graphical output, as well as other media such as audio, from the running application to the client.
IETF-syslog protocol
The syslog-protocol standard developed by the Internet Engineering Task Force (IETF), described in RFC 5424-5427.
key pair
A private key and its related public key. The private key is known only to the owner, while the public key can be freely distributed. Information encrypted with the private key can only be decrypted using the public key.
LDAP
The Lightweight Directory Access Protocol (LDAP), is an application protocol for querying and modifying data using directory services running over TCP/IP.
log path
A combination of sources, filters, parsers, rewrite rules, and destinations: syslog-ng examines all messages arriving to the sources of the logpath and sends the messages matching all filters to the defined destinations.
log source host
A host or network device (including syslog-ng clients and relays) that sends logs to the syslog-ng server. Log source hosts can be servers, routers, desktop computers, or other devices capable of sending syslog messages or running syslog-ng.
log statement
See log path.
logspace
The virtual container on SSB of log messages collected from clients and from SSB itself. Can be of the type: logstore or plain text logspace. See also logstore and plain text logspace.
logstore
A binary logfile format that can encrypt, compress, and time stamp log messages.
Long Term Supported release
Long Term Supported releases are major releases of that are supported for three years after their original release.
LSH
See log source host.
Management network interface
The management interface (labeled 2 or MGMT) is used exclusively for communication between SSB and the auditor or the administrator of the syslog-ng Store Box.
master node
The active SSB unit that is inspecting the traffic when SSB is used in High Availability mode.
multiple logspace
A logspace that aggregates log messages from several logspaces. A multiple logspace can be searched like any other logspace on SSB, and you can also create filtered logspaces that are based on a multiple logspace. See also filtered logspace.
name server
A network computer storing the IP addresses corresponding to domain names.
node
An SSB unit running in High Availability mode.
Note
Circumstance, that needs special attention.
output buffer
A part of the memory of the host where syslog-ng stores outgoing log messages if the destination cannot accept the messages immediately.
output queue
Messages from the output queue are sent to the target syslog-ng server. The syslog-ng application puts the outgoing messages directly into the output queue, unless the output queue is full. The output queue can hold 64 messages, this is a fixed value and cannot be modified.
overflow queue
See output buffer.
parser
A set of rules to segment messages into named fields or columns.
ping
A command that sends a message from a host to another host over a network to test connectivity and packet loss.
port
A number ranging from 1 to 65535 that identifies the destination application of the transmitted data. For example: SSH commonly uses port 22, web servers (HTTP) use port 80, and so on.
Public-key authentication
An authentication method that uses encryption key pairs to verify the identity of a user or a client.
redundant Heartbeat interface
A redundant Heartbeat interface is a virtual interface that uses an existing interface of the SSB device to detect that the other node of the SSB cluster is still available. The virtual interface is not used to synchronize data between the nodes, only Heartbeat messages are transferred.
regular expression
A regular expression is a string that describes or matches a set of strings.
relay mode
In relay mode, syslog-ng receives logs through the network from syslog-ng clients and forwards them to the central syslog-ng server using a network connection.
Remote Desktop Gateway
Remote Desktop Gateway (RD Gateway) is a role service in the Remote Desktop Services server role that allows authorized remote users to connect to resources located on an internal or private network from any Internet-connected device. The accessible resources can be terminal servers, remote applications, remote desktops, and so on. This service is also called Remote Desktop Gateway or RD Gateway.
rewrite rule
A set of rules to modify selected elements of a log message.
SaaS
Software-as-a-Service.
server mode
In server mode, syslog-ng acts as a central log-collecting server. It receives messages from syslog-ng clients and relays over the network, and stores them locally in files, or passes them to other applications, for example, log analyzers.
Skin
Used to design the online output window.
slave node
The passive SSB unit that replaces the active unit (the master node) if the master becomes unavailable.
Snippet
Flare file type that can be used to reuse content. The One Identity SSB contains various default snippets.
SNMP
Simple Network Management Protocol (SNMP) is an industry standard protocol used for network management. SSB can send SNMP alerts to a central SNMP server.
source
A named collection of configured source drivers.
source driver
A communication method used to receive log messages.
source, local
A source that receives log messages from within the host, for example, from a file.
source, network
A source that receives log messages from a remote host using a network connection, for example, network(), syslog().
split brain
A split brain situation occurs when for some reason (for example the loss of connection between the nodes) both nodes of an SSB cluster become active (master). This might cause that new data (for example, audit trails) is created on both nodes without being replicated to the other node. Thus, it is likely in this situation that two diverging sets of data are created, which cannot be trivially merged.
SSB
syslog-ng Store Box
SSH settings
SSH settings determine the parameters of the connection on the protocol level, including timeout value and greeting message of the connection, as well as the encryption algorithms used.
SSL
See TLS.
syslog-ng
The syslog-ng application is a flexible and highly scalable system logging application, typically used to manage log messages and implement centralized logging.
syslog-ng agent
The syslog-ng Agent for Windows is a commercial log collector and forwarder application for the Microsoft Windows platform. It collects the log messages of the Windows-based host and forwards them to a syslog-ng server using regular or SSL-encrypted TCP connections.
syslog-ng client
A host running syslog-ng in client mode.
syslog-ng Premium Edition
The syslog-ng Premium Edition is the commercial version of the open-source application. It offers additional features, like encrypted message transfer and an agent for Microsoft Windows platforms.
syslog-ng relay
A host running syslog-ng in relay mode.
syslog-ng server
A host running syslog-ng in server mode.
template
A user-defined structure that can be used to restructure log messages or automatically generate file names.
Tip
Additional, usefull information.
TLS
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols which provide secure communications on the Internet. The application can encrypt the communication between the clients and the server using TLS to prevent unauthorized access to sensitive log messages.
traceroute
A command that shows all routing steps (the path of a message) between two hosts.
  •  上一页
  • Viewing Topics 297 - 297 of 297
  • 下一页 

 欢迎访问支持

您可以在附属支持站点上查找适用于戴尔*产品*的在线支持帮助。单击“继续”,转至适用于*产品*的正确支持内容和帮助。

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级

公司
  • 关于我们
  • 购买
  • 联系我们
  • 招聘职位
  • 新闻
资源
  • 知识库
  • 下载软件
  • 技术说明文件
  • One Identity University
  • 专业服务
有关
  • 续订支持
  • 获得许可 帮助
社交网络
  • Facebook
  • Google Plus
  • Twitter
  • LinkedIn
已选择 中国 网站版本
  • Albania
  • Angola
  • Anguilla
  • Antigua & Barbuda
  • Argentina
  • Aruba
  • Australia
  • Austria
  • Azerbaijan
  • Bahamas
  • Bahrain
  • Barbados
  • Belgium
  • Belize
  • Benin
  • Bermuda
  • Bolivia
  • Bosnia-Herzegovina
  • Botswana
  • Brazil
  • British Virgin Islands
  • Bulgaria
  • Burkina Faso
  • Burundi
  • Cameroon
  • Canada
  • Cape Verde
  • Cayman Islands
  • Central African Republic
  • Chad
  • Chile
  • 中国
  • Colombia
  • Comros
  • Congo
  • Costa Rica
  • Croatia (Hrvatska)
  • Cyprus
  • Czech Republic
  • Democratic Republic of Congo
  • Denmark
  • Djibouti
  • Dominica
  • Dominican Republic
  • Ecuador
  • Egypt
  • El Salvador
  • Estonia
  • Ethiopa
  • Finland
  • France
  • French Guiana
  • French Overseas Territories
  • French Polynesia
  • Gabon
  • Gambia
  • Germany
  • Ghana
  • Greece
  • Grenada
  • Guadeloupe
  • Guatemala
  • Guinea
  • Guyana
  • Haiti
  • Honduras
  • Hong Kong
  • Hungary
  • Iceland
  • India
  • Ireland
  • Israel
  • Italy
  • Ivory Coast
  • Jamaica
  • 日本
  • Jordan
  • Kenya
  • 대한민국
  • Kuwait
  • Latvia
  • Lesotho
  • Liberia
  • Libya
  • Lithuania
  • Luxembourg
  • Macedonia
  • Madagascar
  • Malawi
  • Malaysia
  • Mali
  • Malta
  • Martinique
  • Mauritania
  • Mauritius
  • Mayotte
  • Mexico
  • Monaco
  • Montenegro
  • Montserrat
  • Mozambique
  • Namibia
  • Netherlands
  • New Caledonia
  • New Zealand
  • Nicaragua
  • Niger
  • Nigeria
  • Norway
  • Oman
  • Panamá
  • Paraguay
  • Peru
  • Philippines
  • Poland
  • Portugal
  • Puerto Rico
  • Qatar
  • Reunion
  • Romania
  • Russian Federation
  • Rwanda
  • Saudi Arabia
  • Senegal
  • Serbia
  • Seychelles
  • Sierra Leone
  • Singapore
  • Slovakia
  • Slovenia
  • Somalia
  • South Africa
  • Spain
  • St. Kitts & Nevis
  • St. Lucia
  • St. Vincent & Grenadines
  • Suriname
  • Swaziland
  • Sweden
  • Switzerland
  • Taiwan
  • Tanzania
  • Thailand
  • Togo
  • Trinidad y Tobago
  • Turkey
  • Turks & Caicos Islands
  • Uganda
  • Ukraine
  • United Kingdom
  • United States
  • Uruguay
  • US Virgin Islands
  • Venezuela
  • Yemen
  • Zambia
  • Zimbabwe
中国
中文 | English

© 2025 One Identity LLC. ALL RIGHTS RESERVED. 使用条款 隐私 Cookie Preference Center

确定 转到“My Account”(我的帐户)

IE 8、9和10不再受支持

One Identity门户不再支持IE 8、9和10,建议将您的浏览器升级到最新版本的Internet Explorer或Chrome。

要升级到IE 11,请单击此处

要升级到Chrome,请单击此处

如果继续使用IE 8、9和10,您将无法充分利用我们所有出色的自助服务功能。

Close