Skip to content

Commit ece1780

Browse files
committed
Add release note
1 parent 5d2998e commit ece1780

File tree

4 files changed

+48
-25
lines changed

4 files changed

+48
-25
lines changed
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Cloud Syslog Source Certificate Transition to ACM (Collection)
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- certificates
6+
- Cloud Syslog Source
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to announce that we are transitioning to AWS Certificate Manager (ACM) certificates for Transport Layer Security (TLS) communication between your cloud syslog sources and Sumo Logic.
13+
14+
Currently, Sumo Logic uses a DigiCert ALB certificate to secure communication with your cloud syslog sources. This certificate is set to expire in October 2025. At that time, Sumo Logic will transition to the ACM root certificate because it offers the following benefits:
15+
* **Automated certificate renewal and deployment**. This change will eliminate the need for future manual renewals, reducing your administrative burden.
16+
* **Simplified infrastructure management for AWS customers**. ACM is deeply integrated into the AWS ecosystem, streamlining your overall infrastructure management.
17+
18+
If you use cloud syslog sources to send data to Sumo Logic, in preparation for the certificate transition we ask that you download and configure ACM certificates on your system. For more information, see:
19+
* [Cloud Syslog Source](/docs/send-data/hosted-collectors/cloud-syslog-source/)
20+
* [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog)
21+
* [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/)
22+
* [Collect Logs for SentinelOne](/docs/send-data/collect-from-other-data-sources/collect-logs-sentinelone/)
23+
* [Acquia](/docs/integrations/saas-cloud/acquia/#step-2-configure-a-source)

docs/send-data/hosted-collectors/cloud-syslog-source/index.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@ where `YOUR_DEPLOYMENT` is `au`, `ca`, `de`, `eu`, `fed`, `jp`, `kr`, `us1`,
2525
FIPS 140-2 compliance is not available for Cloud Syslog in the FedRAMP deployment. It is with great emphasis that you must recognize and understand that the responsibility to mitigate information spillage is solely yours. We have no insight into your data or how it is classified.
2626
:::
2727

28-
In the procedure below, you configure a Cloud Syslog Source. This will generate a Sumo Logic token and the endpoint hostname. Then you set up TLS by downloading a cert to your server. Download the DigiCert and AWS Certificate Manager (ACM) certificates from the following locations:
28+
In the procedure below, you configure a Cloud Syslog Source. This will generate a Sumo Logic token and the endpoint hostname.
29+
30+
Then you set up TLS by downloading a cert to your server (see procedures for [rsyslog](/docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog/#setup-tls) and [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/#setup-tls)). Download the DigiCert and AWS Certificate Manager (ACM) certificates from the following locations:
2931
* https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt
3032
* https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt.pem
3133
* https://www.amazontrust.com/repository/AmazonRootCA1.cer

docs/send-data/hosted-collectors/cloud-syslog-source/rsyslog.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,13 @@ Sumo Logic supports syslog clients such as rsyslog. This document has instructi
1212

1313
Set up Transport Layer Security (TLS).
1414

15-
Download the DigiCert and ACM certificates from https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt and
15+
Download DigiCert and AWS Certificate Manager (ACM) certificates from https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt and
1616
https://www.amazontrust.com/repository/AmazonRootCA1.cer.
1717

1818
### rsyslog
1919

20+
For rsyslog, concatenate the ACM root CA with the DigiCert certificate.
21+
2022
To set up your DigiCert and AWS Certificate Manager (ACM) certificate, follow these steps:
2123

2224
```bash

docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng.md

Lines changed: 19 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -10,37 +10,33 @@ Sumo Logic supports syslog clients such as syslog-ng. This document has instruc
1010

1111
## Set up TLS
1212

13-
Set up Transport Layer Security (TLS).
13+
Set up Transport Layer Security (TLS).
1414

1515
Download the DigiCert and AWS Certificate Manager (ACM) certificates from https://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt and
16-
https://www.amazontrust.com/repository/AmazonRootCA1.cer.
16+
https://www.amazontrust.com/repository/AmazonRootCA1.cer.
1717

1818
### syslog-ng
1919

20-
For syslog-ng place the certificates in the configuration directory and the syslog-ng client will pick up the certificates working from that directory.
20+
For syslog-ng, place both certificates in the configuration directory, allowing the syslog-ng client to automatically select the appropriate certificate.
2121

2222
To set up your DigiCert and AWS Certificate Manager (AWS) certificates, follow these steps:
2323

24-
Check if you have the directory `/etc/syslog-ng/ca.d`.
25-
26-
If you don’t, create it with this command:
27-
28-
```bash
29-
$ $ sudo mkdir -pv /etc/syslog-ng/ca.d
30-
```
31-
32-
Then run:
33-
34-
```bash
35-
$ cd /etc/syslog-ng/ca.d
36-
$ sudo wget -O digicert_ca.der https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt
37-
$ sudo openssl x509 -inform der -in digicert_ca.der -out digicert_ca.crt
38-
$ sudo ln -s digicert_ca.crt `openssl x509 -noout -hash -in digicert_ca.crt`.0
39-
$ wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer
40-
$ openssl x509 -inform der -in acm_ca.der -out acm_ca.crt
41-
$ ln -s acm_ca.crt `openssl x509 -noout -hash -in acm_ca.crt`.0
42-
$ sudo /etc/init.d/syslog-ng restart
43-
```
24+
1. Check if you have the directory `/etc/syslog-ng/ca.d`.
25+
1. If you don’t, create it with this command:
26+
```bash
27+
$ sudo mkdir -pv /etc/syslog-ng/ca.d
28+
```
29+
1. Then run:
30+
```bash
31+
$ cd /etc/syslog-ng/ca.d
32+
$ sudo wget -O digicert_ca.der https://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt
33+
$ sudo openssl x509 -inform der -in digicert_ca.der -out digicert_ca.crt
34+
$ sudo ln -s digicert_ca.crt `openssl x509 -noout -hash -in digicert_ca.crt`.0
35+
$ wget -O acm_ca.der https://www.amazontrust.com/repository/AmazonRootCA1.cer
36+
$ openssl x509 -inform der -in acm_ca.der -out acm_ca.crt
37+
$ ln -s acm_ca.crt `openssl x509 -noout -hash -in acm_ca.crt`.0
38+
$ sudo /etc/init.d/syslog-ng restart
39+
```
4440

4541
### Send data to a Cloud Syslog Source with syslog-ng
4642

0 commit comments

Comments
 (0)