Skip to content

Commit a0f5034

Browse files
committed
up
1 parent ac12627 commit a0f5034

File tree

2 files changed

+13
-1
lines changed

2 files changed

+13
-1
lines changed

crowdsec-docs/static/img/user_guide_log_centralization.svg

Lines changed: 4 additions & 0 deletions
Loading

crowdsec-docs/unversioned/user_guides/log_centralization.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,11 @@ sidebar_position: 10
66

77
## Introduction
88

9-
Our goal is to centralize 2 types of logs:
9+
If you expose services on the internet from multiple servers, setting up crowdsec on all of them might make the overall setup more complex.
10+
11+
In order to keep things simpler, you can use a central server that will receive all your logs, and only run a single instance of crowdsec on this server
12+
13+
In this guide, our goal is to centralize 2 types of logs:
1014
- Nginx logs
1115
- SSH auth logs
1216

@@ -20,7 +24,11 @@ Finally, we will have a Firewall Remediation Component running on each of our we
2024

2125
Our infrastructure will look like this:
2226

27+
![target-infra](/img/user_guide_log_centralization.svg)
2328

29+
Before diving into the setup, a few key points:
30+
- If you have a firewall, you will need to allow communication on 514/UDP (syslog) and 8080/TCP (crowdsec LAPI) from the web servers to the central server
31+
- By default, rsyslog is a clear-text protocol. If you all the machines interact over LAN, this is probably not an issue, but they are communication over internet, you will probably want to setup TLS on the syslog server.
2432

2533
## Rsyslog Server Setup
2634

0 commit comments

Comments
 (0)