Syslog Security
Use the Syslog Security feature to encrypt communication between the library and the Syslog Server with Transport Layer Security (TLS).
Use the Enable button and enter the information for the three required fields:
page to enable TLS for the Syslog. Click on the- CA certificate (Rsyslog):
This is the Certificate Authority for your Syslog Server, which is used to sign all certificates. If you already have a Syslog Server then this has already been created by the certificate authority.
- Library server certificate:
This is the server certificate that is configured by the certificate authority for the library. This is the library's certificate. A new client (the tape library) that connects to the syslog server must have this certificate.
- Library private key:
This is the private key that is also configured by the certificate authority for the new client, the tape library. This is the tape library's private key.
# make gtls driver the default
$DefaultNetstreamDriver gtls
# certificate files
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/tls-caibm-bundle.pem
$DefaultNetstreamDriverCertFile /etc/rsyslog.d/59_sys_certO.pem
$DefaultNetstreamDriverKeyFile /etc/rsyslog.d/SERVERTron-key.pem
$InputTCPServerStreamDriverAuthMode x509/name
$InputTCPServerStreamDriverPermittedPeer *.gdl.mex.ibm.com
$InputTCPServerStreamDriverPermittedPeer 9.18.77.*
$InputTCPServerStreamDriverMode 1 # run driver in TLS-only mode
$InputTCPServerRun 6514 #
After the Syslog Security certificates and Key are set, go to the Syslog Server page and use the Actions menu to modify the Server Port to match the one set in the server.