You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/log-collector-advanced-management.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,9 +50,9 @@ You should be able to view the following contents:
50
50
- `ssl_update`
51
51
- `config.json`
52
52
53
-
### Customize certificate files
53
+
### Add certificate files
54
54
55
-
This procedure describes how to customize the certificate files used for secure connections to the cloud discovery Docker instance.
55
+
This procedure describes how to add the required certificate files used for secure connections to the cloud discovery Docker instance.
56
56
57
57
1. Open an FTP client and connect to the log collector host.
58
58
@@ -63,7 +63,7 @@ This procedure describes how to customize the certificate files used for secure
63
63
|**FTP**|- **pure-ftpd.pem**: Includes the key and certificate data |
64
64
|**Syslog**|- **ca.pem**: The certificate authority's certificate that was used to sign the client’s certificate. <br>- **server-key.pem** and **server-cert.pem**: The log collector's certificate and key <br><br>Syslog messages are sent over TLS to the log collector, which requires mutual TLS authentication, including authenticating both the client and server certificates. |
65
65
66
-
Filenames are mandatory. If any of the files are missing, the update fails.
66
+
Files are mandatory. If any of the filesfor the receiver type are missing, the update fails.
To secure the docker image and ensure that only one IP address is allowed to send the syslog messages to the log collector, create an IP table rule on the host machine to allow input traffic and drop the traffic coming over specific ports, such as TCP/601 or UDP/514, depending on the deployment.
163
163
164
-
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4`` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
164
+
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
0 commit comments