The syslog-ng Premium Edition 5F2



Similar documents
The syslog-ng Premium Edition 5LTS

The syslog-ng Store Box 3 LTS

The syslog-ng Store Box 3 F2

syslog-ng Store Box PRODUCT DESCRIPTION Copyright BalaBit IT Security All rights reserved.

Distributed syslog architectures with syslog-ng Premium Edition

Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS

Performance Guideline for syslog-ng Premium Edition 5 LTS

The syslog-ng 3.0 Administrator Guide

syslog-ng Product Line

The syslog-ng Premium Edition 5 LTS Administrator Guide

The syslog-ng Premium Edition 5 F3 Administrator Guide

The syslog-ng Open Source Edition 3.6 Administrator Guide

Performance measurements of syslog-ng Premium Edition 4 F1

What is new in syslog-ng Premium Edition 4 F1

The syslog-ng Open Source Edition 3.5 Administrator Guide

The syslog-ng Open Source Edition 3.4 Administrator Guide

The syslog-ng Store Box 4 LTS Administrator Guide

The syslog-ng Open Source Edition 3.2 Administrator Guide

PCI DSS compliance and log management

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

The syslog-ng Open Source Edition 3.5 Administrator Guide

syslog-ng 3.0 Monitoring logs with Nagios

The syslog-ng Agent for Windows 5 LTS Administrator Guide

Alliance Key Manager Solution Brief

GFI Product Manual. Deployment Guide

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

The syslog-ng Open Source Edition 3.7 Administrator Guide

What is new in syslog-ng Premium Edition 5 F3

SOSFTP Managed File Transfer

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

Security Correlation Server Quick Installation Guide

GFI Product Manual. Administrator Guide

GFI Product Manual. Administrator Guide

syslog-ng: nyers adatból Big Data

PATROL Console Server and RTserver Getting Started

Red Condor Syslog Server Configurations

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

Heroix Longitude Quick Start Guide V7.1

Avira AntiVir MailGate 3.2 Release Notes

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

A Universal Logging System for LHCb Online

Centralized Logging With syslog ng. Ryan Ma6eson h6p://prefetch.net

Netwrix Auditor for Windows Server

Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics

What is new in Zorp Professional 6

Enterprise Manager. Version 6.2. Installation Guide

Architecture and Mode of Operation

EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS

Enforcive /Cross-Platform Audit

Alliance Key Manager A Solution Brief for Technical Implementers

Technical Specification Data

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

NXLOG Community Edition Reference Manual for v

HP A-IMC Firewall Manager

DATA BACKUP & RESTORE

Where can I install GFI EventsManager on my network?

SNARE Server Release Notes - Release 4.0

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

IT Infrastructure Management

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

SapphireIMS 4.0 BSM Feature Specification

WHITE PAPER September CA Nimsoft Monitor for Servers

VERITAS Cluster Server v2.0 Technical Overview

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

DiskPulse DISK CHANGE MONITOR

Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK tel:

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Enterprise Manager. Version 6.2. Administrator s Guide

Secospace elog. Secospace elog

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA

Netwrix Auditor for Active Directory

Configuration Information

Content Distribution Management

Managed File Transfer

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Flowlink Pro Server Software Installation Guide

TSM Studio Server User Guide

Exporting IBM i Data to Syslog

IBM CICS Transaction Gateway for Multiplatforms, Version 7.0

Release Notes for Websense Security v7.2

Architecture and Mode of Operation

FREQUENTLY ASKED QUESTIONS

Configuring Logging. Information About Logging CHAPTER

Security Correlation Server Quick Installation Guide

How to Secure a Groove Manager Web Site

Xerox Global Print Driver. Installation Guide

Guide to SNARE for MSSQL v1.2

Symantec Mail Security for Domino

HP PCM Plus v3 Network Management Software Series Overview

What is new in syslog-ng Agent for Windows 5 LTS

JobScheduler. Architecture and Mode of Operation. Software for Open Source

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Transcription:

The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com

Introduction The syslog-ng Premium Edition enables enterprises to collect, filter, normalize, forward, and store log messages from across their IT environment. Using syslog-ng Premium Edition, organizations can centralize and simplify their log management infrastructure to improve operations, gain visibility of security threats, and meet compliance requirements. Supporting reliable transport protocols, message buffering, and client-side failover, syslog-ng prevents message loss, helping users meet even the most stringent compliance requirements, such as PCI-DSS. The syslog-ng application is one of the most widespread log message collection and management applications. It embodies the next generation of log management infrastructure. The syslog-ng application: collects log messages from wide variety of applications and devices supports over 50 server platforms provides encrypted log transfer and storage prevents message loss during transport provides real-time log message filtering and classification with unparalleled flexibility

Typical end-users Log messages contain information about the events happening in IT networks. Monitoring system events is essential for security and system diagnostics. Many log messages contain irrelevant information; syslog-ng helps you to select only the relevant messages, and forward them to a central server. Company policies or other regulations often require log messages to be archived; storing important messages in a central location greatly simplifies this process. The syslog-ng application is used worldwide by companies and institutions that collect and manage log messages from numerous sources and need to store them in a centralized, organized way. Using syslog-ng is particularly advantageous for: Telecommunications Operators; Internet Service Providers; Financial institutions and companies requiring policy compliance; Server, web, and application hosting companies; Educational Institutions; Government Agencies Public references Companies using syslog-ng Premium Edition: AirFrance (http://www.airfrance.com/) COOP (http://om.coop.dk/) Fon (http://corp.fon.com/en) Magyar Telekom (http://www.telekom.hu) Svenska Handelsbanken AB (http://www.handelsbanken.com/) Telenor (http://www.telenor.com/) University of Victoria (http://www.uvic.ca/)

Product features and benefits Secure log transfer via SSL/TLS protocols Message filtering, parsing and rewriting Secure storage using public-key encryption Rapid message identification based on pattern databases Multi-thread processing enabling high capacity Support for the latest IETF syslog protocol standards Reliable log transfer using TCP and Reliable Log Transfer Agents for Microsoft Windows and IBM System i platforms Protocol Disk-based message buffering to prevent message loss Flow-control preventing message loss during peak loads Fail-over support IPv4 and IPv6 support Support for over 50 server platforms Direct database access for MSSQL, MySQL, Oracle, PostgreSQL, and SQLite How syslog-ng works The syslog-ng application reads incoming messages and forwards them to the selected destinations. The syslog-ng application can receive messages from files, remote hosts, and other sources. Log messages enter syslog-ng in one of the defined sources, and are sent to one or more destinations. Sources and destinations are independent objects; log paths define what syslog-ng does with a message, connecting the sources to destinations. A log path consists of one or more sources and one or more destinations; messages arriving from a source are sent to every destination listed in the log path. A log path defined in syslog-ng is called a log statement. Optionally, log paths can include filters. Filters are rules that select only certain messages, for example, selecting only messages sent by a specific application. If a log path includes filters, syslog-ng sends only the messages satisfying the filter rules to the destinations set in the log path. Other optional elements that can appear in log statements are parsers and rewriting rules. Parsers segment messages into different fields to help processing the messages, while rewrite rules modify the messages by adding, replacing, or removing parts of the messages.

The following simple scenario illustrates the route of a log message from its source on the syslog-ng client to its final destination on the central syslog-ng server. 1. A device or application sends a log message to a source on the syslog-ng client. For example, an Apache web server running on Linux enters a message into the /var/log/apache file, or an application running on Windows enters a message into the Eventlog. 2. The syslog-ng client running on the web server reads the message from its /var/log/apache or Eventlog source. 3. The syslog-ng client processes the first log statement that includes the /var/log/apache or the Eventlog source. 4. The syslog-ng client compares the message to the filters defined in the log path (if any). If the message complies with all filter rules, syslog-ng sends the message to the destinations defined in the log path, for example, to the remote syslog-ng server. 5. The syslog-ng client processes the next log statement that includes the source of the message, repeating Steps 3-4. 6. The message sent by the syslog-ng client arrives to a source set in the syslog-ng server. 7. The syslog-ng server reads the message from its source and processes the first log statement that includes that source. 8. The syslog-ng server compares the message to the filters of the log statement (if any). If the message complies with all filter rules, syslog-ng sends the message to the destinations set in the log statement. 9. The syslog-ng server processes the next log statement, repeating Steps 7-9. application #2 application #2 application #2 local destinations Log messages Log messages Log messages Log paths source #1 source #2 source #3 log paths filters network destinations network sources syslog-ng client client host syslog-ng server

Secure logging using SSL/TLS Log messages may contain sensitive information that should not be accessed by third parties. Therefore, syslog-ng uses the Transport Layer Security (TLS) protocol to encrypt the communication. TLS also allows the mutual authentication of the host and the server using X.509 certificates. Encrypted, timestamped log storage syslog-ng Premium Edition can store log messages securely in encrypted, compressed, indexed, and timestamped binary files, so any sensitive data is available only for authorized personnel who have the appropriate encryption key. The logstore files can be encrypted with multiple encryption keys as well. Timestamps can be requested from external Timestamping Authorities. Reliable log transfer The syslog-ng application enables you to send log messages from your hosts to remote servers. The logs of different servers can be collected and stored centrally on dedicated log servers. Transferring log messages using the TCP protocol ensures that no messages are lost. The syslog-ng Premium Edition application supports client-side failover to reduce the risk of message loss, meaning that the log messages can be sent to secondary log servers in case the primary server becomes inaccessible. syslog-ng Premium Edition supports Reliable Log Transfer Protocol which enables application level acknowledgement preventing message loss. The syslog-ng application residing on the server acknowledges receipt of log messages from the syslog-ng application on the client ensuring that messages are not lost in the event of a transport layer fault. On the wire compression Using the Reliable Log Transfer Protocol (RLTP), syslog-ng Premium Edition can compress log data being transferred to a central log server. Log messages can be compressed to one-sixth of their original size which is particularly useful in environments with bandwidth constraints. Disk-based message buffering syslog-ng Premium Edition stores messages on the client-side local hard disk if the central log server or the network connection becomes unavailable. The syslog-ng application automatically sends the stored messages to the server when the connection is reestablished in the same order the messages were received. The disk buffer is persistent no messages are lost even if syslog-ng is restarted or terminates unexpectedly.

Flow-control syslog-ng can adaptively control the rate of messages read by using the Flow-control feature which determines if there is free space in the output buffer of syslog-ng for new messages. If the output queue is full, then the destination cannot accept new messages for some reason: for example, it is overloaded, or the network connection became unavailable. In such cases, syslog-ng stops reading messages from the source until some messages have been successfully sent to the destination. Flexible message filtering and sorting The syslog-ng application can sort incoming log messages based on their content and various parameters like source host, application, and priority. Directories, files, and database tables can be created dynamically using macros. Complex filtering using regular expressions and Boolean operators offers almost unlimited flexibility to forward only the important log messages to the selected destinations. Message classification The syslog-ng application can compare the contents of the received log messages to predefined message patterns. By comparing the messages to known patterns, syslog-ng is able to identify the exact type of messages, and sort them into message classes. The message classes can be used to classify the type of the event described in the log message. The message classes can be customized, and for example can label the messages as user login, application crash, file transfer, etc. events. Also, it is much easier to understand syslog-ng patterns than regular expressions. To make the message classification more flexible and robust, the patterns can contain pattern parsers: elements that match on a set of characters. For example, the NUMBER parser matches on any integer numbers (for example 1, 123, 894054, and so on). Other pattern parsers match on various strings and IP addresses. Message parsing and rewriting The syslog-ng application can segment log messages to named fields or columns. These fields can be used like macros in filenames and database tables. It is also possible to modify the values of these fields, for example, to add missing values. Detect configuration changes Changes to your logging infrastructure are important events that should not go unnoticed. The syslog-ng application automatically detects if its configuration is modified, and sends a warning message into the system logs. Scalability The syslog-ng application is optimized for performance, and can handle enormous amount of messages. Depending on its exact configuration, it can process over 650,000 messages per second real-time, and over 300 GB raw logs per hour on standard server hardware.

Supported sources and destinations The syslog-ng Premium Edition application can accept log messages from the following sources: Local applications and processes sending messages to UNIX domain sockets, named pipes, plain text files, or to the standard output (stdout). systemd-journald a system service that collects and stores log data Remote clients sending traditional syslog messages (as described in RFC3164) using UDP, TCP, or TLS protocols over IPv4 and IPv6 networks. Remote clients sending messages conforming to the latest IETF syslog protocol standard using the UDP, TCP, or TLS protocol over IPv4 and IPv6 networks. Databases such as MSSQL, MySQL, PgSQL, Oracle, SQLite and MongoDB Devices sending SNMP traps. The syslog-ng Premium Edition application can send log messages to the following destinations: Plain text files. Encrypted, compressed, and optionally timestamped binary files. Databases such as MSSQL, MySQL, PgSQL, Oracle, SQLite and MongoDB Local processes using UNIX domain sockets, named pipes, or simple pipes. Remote syslog-ng servers using the legacy BSD-syslog (RFC3164) or the new IETF-syslog (RFC5424) protocols over IPv4 and IPv6 networks. The IETF-syslog protocol supports TLS-encryption as well. e-mail servers via Simple Mail Transfer Protocol (SMTP) User-terminal. Besides being able to communicate over several protocols, syslog-ng can is also being extremely flexible when it comes to the formatting of message content. It can parse or format messages in highly customizable way, including: RFC-compliant syslog format CSV JSON Snare WELF Log messages spanning multiple lines (for example, Apache Tomcat logs) are also supported. Read logs from any text file Some applications use many different logfiles, and sometimes these files are not even located in the same folder. Automatically generated file and folder names are also often a problem. To solve these issues, the filenames and paths specifying the log files read by syslog-ng can include wildcards, and syslog-ng can automatically scan entire subfolder-trees for the specified files.

Direct database access Storing log messages in a database allows you to easily search and query the messages and inter-operate with log analyzing applications. The Premium Edition of syslog-ng can directly send and receive logs from the following databases: MySQL, Microsoft SQL (MSSQL), Oracle, PostgreSQL, SQLite, and MongoDB. IPv4 and IPv6 support The syslog-ng application can operate in both IPv4 and IPv6 network environments; it can receive messages from and send messages to both types of networks. Supported platforms The syslog-ng Premium Edition application supports over 50 platforms and several architectures, including x86, x86_64, Alpha, Itanium, and SUN SPARC on a variety of operating systems: recent and legacy Linux- and Unix-variants, BSD, HP-UX, IBM AIX, IBM System I, Microsoft Windows XP, Server 2012, Server 2003, Vista, Server 2008, Windows 7, Sun Solaris, and Tru64. For the latest list of supported platforms, visit the syslog-ng Premium Edition webpage at http://www.balabit.com/network-security/syslog-ng/central-syslog-server/ Microsoft Windows platform support The syslog-ng Premium Edition 5LTS version can now be installed on servers running Windows XP, Server 2012, Server 2008, Server 2003 and Windows 7. It can be installed as a client, relay or server to collect and manage Windows eventlog messages as well as log messages from network and security devices and standard and custom applications. For deployments requiring a lightweight agent with GUI, the syslog-ng Agent for Windows can collect the log messages from eventlog groups and log files and forwards them to a syslog-ng server using regular or TLS-encrypted TCP connections. The syslog-ng Agent can be managed from a domain controller using group policies, or run as a standalone application.

Agent for IBM System i platforms The syslog-ng agent for IBM System i is a system log collector and forwarder application for the IBM System i (formerly known as AS/400 and IBM iseries) platform. It collects application and system messages, as well as messages from the System i security audit journal (QAUDJRN) and the operator message queue (QSYSOPR). The collected messages are forwarded to a syslog-ng server using regular or TLS-encrypted TCP connections. The syslog-ng server can run on a separate machine, or directly on IBM System i in the Portable Application Solutions Environment (PASE). The syslog-ng Agent for IBM System i is available as a standalone product and must be licensed independently from syslog-ng Premium Edition. Product support Product support, including 7x24 online support is available in various packages. For a complete list of the support options, visit the following page: http://www.balabit.com/support/packages/ Free evaluation version Test syslog-ng Premium Edition to make sure that it perfectly suits your needs. Request an evaluation version at http://www.balabit.com/mybalabit/. To learn more about commercial and open source BalaBit products, request an evaluation version, or find a reseller, visit the following links: The syslog-ng homepage: http://www.balabit.com/network-security/syslog-ng/ The Shell Control Box homepage: http://www.balabit.com/network-security/scb/ The syslog-ng Store Box (SSB) homepage: http://www.balabit.com/network-security/syslog-ng/log-server-appliance/ Product manuals, guides, and other documentation: http://www.balabit.com/support/documentation/ Request an evaluation version: https://www.balabit.com/mybalabit/ Find a reseller: http://www.balabit.com/partnership/commercial/ Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com

Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com