Configuring remote syslog auditing in SSMC
SSMC supports export of audit log events to a remote syslog server (Security Information and Event Management (SIEM) systems). You can configure this in multiple ways.
If you intend to export audit log events pertaining to the web application that is simple and easy to use, then follow the instructions given in this section. However, if you want a more comprehensive means that includes auditable events from both web application and SSMC appliance user sessions and follows NIST 800-53 guidelines, then skip this section and see the section Export logs to remote logging server.
- Create a backup copy of the
log4j2.json
located in the/opt/hpe/ssmc/ssmcbase/resources/
directory in the SSMC appliance.NOTE:The SSMC administrator can take a backup copy of the JSON file in the home directory. For example, the administrator can run the command
cp -p /opt/hpe/ssmc/ssmcbase/resources/log4j2.json ~/log4j2.json.bak
, which creates a backup of the/opt/hpe/ssmc/ssmcbase/resources/log4j2.json
file as/home/ssmcadmin/log4j2.json.bak
. Use a text editor with JSON-aware syntax checking to avoid any errors. Syntax mistakes in the
log4j2.json
file, such as missing a bracket or comma, can cause all logging to fail.If you do not have the JSON-aware syntax text editor, then run the following command:
ssmcadmin@ssmc361:/opt/hpe/ssmc/ssmcbase/resources$ python -m json.tool < log4j2.json > /dev/null Expecting property name: line 25 column 1 (char 497) ssmcadmin@ssmc361:/opt/hpe/ssmc/ssmcbase/resources$
If there are no errors, this command does not generate any output.
You can also use the SSMC setup menu to avoid the syntax errors.
Gather the host IP address, port number, and protocol values from your Syslog host system.
If your Syslog host system uses SSL, you must have the password for the truststore that contains the trusted certificate for your Syslog host. To generate a new trusted certificate for your Syslog host, see Generating a new trust store for SSMC remote Syslog appender.