How to configure SIEM applications to optimally receive logs.
ArcSight
ArcSight recommends that you name the certificate syslog-ng
.
To name the certificate:
Convert the key to p12 format:
openssl pkcs12 -inkey syslogServer.key -in syslogServer.crt -export -out syslog-ng.p12 -name "syslogng-alias" -password pass:changeit
To make sure the environment variable ARCSIGHT_HOME is the connector install directory:
ARCSIGHT_HOME/current/bin/arcsight agent keytoolgui
$ARCSIGHT_HOME/current/jre/lib/security/cacerts (password "changeit").
Ca.pem
and save it.To edit the agent.properties file to enable mutual authentication:
Use vi $ARCSIGHT_HOME//current/user/agent/agent.properties
:
syslogng.mutual.auth.enabled=false -> true
syslogng.tls.keystore.file=user/agent/syslog-ng.p12
syslogng.tls.keystore.alias=syslogng-alias
/etc/init.d/arc_connector_name restart
Splunk
cat syslogServer.crt syslogServer.key RootCA.pem > splunk.pem
inputs.conf
file on the Splunk server:vi /opt/splunk/etc/apps/search/local/inputs.conf
[SSL]
serverCert = /etc/ssl/my-certs/splunk.pem
sslPassword =
<challenge password>
requireClientCert = true
[tcp-ssl://
<port>]
index =
<index>
server.conf
file on the Splunk servervi /opt/splunk/etc/system/local/server.conf
[sslConfig]
sslRootCAPath = /etc/ssl/my-certs/RootCA.pem
/opt/splunk/bin/splunk restart
QRadar
When you use Client Authentication, you must provide the absolute path to the client certificate.