Skip to content

Commit

Permalink
fix(rsyslog-typo): fix typo when using cert
Browse files Browse the repository at this point in the history
  • Loading branch information
Jean GOUDY committed Oct 23, 2023
1 parent fb143a3 commit 1ee6986
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions docs/xdr/features/collect/ingestion_methods/rsyslog.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ After receiving the IDs to connect to the Linux server, the main activities are
3. Download the Sekoia.io certificate

```bash
sudo wget -O /etc/rsyslog.d/Sekoia.io-intake.pem https://app.sekoia.io/assets/files/SEKOIA-IO-intake.pem
sudo wget -O /etc/rsyslog.d/Sekoia-io-intake.pem https://app.sekoia.io/assets/files/SEKOIA-IO-intake.pem
```

4. Modify the `/etc/rsyslog.conf` main configuration file
Expand Down Expand Up @@ -169,7 +169,7 @@ In this section, let suppose that Windows event logs are sent to the Rsyslog on
To this ruleset, an action is defined to tell Rsyslog that all incoming messages associated to it must be forwarded to the Sekoia.io syslog endpoint on a specific Intake. Please change using the YOUR_INTAKE_KEY accordingly.

```bash
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/Sekoia.io-intake.pem
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/Sekoia-io-intake.pem
input(type="imtcp" port="20516" ruleset="remote20516")
template(name="SEKOIAIOWindowsTemplate" type="string" string="<%pri%>1 %timestamp:::date-rfc3339% %hostname% %app-name% %procid% LOG [SEKOIA@53288 intake_key=\"YOUR_INTAKE_KEY\"] %msg%\n")
Expand Down Expand Up @@ -364,7 +364,7 @@ To receive and process Windows logs, you have to follow these steps:

```bash
# Refer to the location of the certificate
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/Sekoia.io-intake.pem
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/Sekoia-io-intake.pem
# Customize the syslog header the an Intake Key to be collected on Sekoia.io while adding a new intake from the catalogue
template(name="SEKOIAIOWindowsTemplate" type="string" string="<%pri%>1 %timestamp:::date-rfc3339% %hostname% %app-name% %procid% LOG [SEKOIA@53288 intake_key=\"YOUR_INTAKE_KEY\"] %msg%\n")
Expand Down Expand Up @@ -438,7 +438,7 @@ Follow these steps to forward logs using RELP Protocol:
target="relp.intake.sekoia.io"
port="11514"
tls="on"
tls.caCert="/etc/rsyslog.d/Sekoia.io-intake.pem"
tls.caCert="/etc/rsyslog.d/Sekoia-io-intake.pem"
tls.authmode="name"
tls.permittedPeer=["relp.intake.sekoia.io"]
template="SEKOIAIOUnboundTemplate"
Expand Down Expand Up @@ -641,7 +641,7 @@ It will automatically configure you Rsyslog server to collect and forward Window
WindowsFile="/etc/rsyslog.d/15-windows.conf"
sudo /bin/cat <<\EOM >$WindowsFile
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/Sekoia.io-intake.pem
$DefaultNetstreamDriverCAFile /etc/rsyslog.d/Sekoia-io-intake.pem
template(name="SEKOIAIOWindowsTemplate" type="string" string="<%pri%>1 %timestamp:::date-rfc3339% %hostname% %app-name% %procid% LOG [SEKOIA@53288 intake_key=\"YOUR_INTAKE_KEY\"] %msg%\n")
Expand All @@ -662,7 +662,7 @@ It will automatically configure you Rsyslog server to collect and forward Window
EOM
# Collect the SEKOIA Key for encryption between Rsyslog and Sekoia.io
sudo wget -O /etc/rsyslog.d/Sekoia.io-intake.pem https://app.sekoia.io/assets/files/SEKOIA-IO-intake.pem
sudo wget -O /etc/rsyslog.d/Sekoia-io-intake.pem https://app.sekoia.io/assets/files/SEKOIA-IO-intake.pem
```
2. Once the file created on the Rsyslog, make it executable with the command `chmod +x <filename.sh>`.
Expand Down

0 comments on commit 1ee6986

Please sign in to comment.