We have been experiencing an issue with our Kiwi Syslog Service crashing about every other day. We are running version 9 and have a pretty standard setup where we are pushing syslogs from all of our devices in our network. We have quite a bit of stuff logging to our Syslog server and are easily breaching the 200000 maximum message count throughout the day and getting email's. We up'ed that and seem to be doing better however the syslog service continues to fail and will at times restart itself based off of the services recovery failure to restart the service but this is happening way to often.
Has anyone else seen this problem and if so, what kinds of things did you try/do? Is this box just getting pegged so hard that it's causing the service to malfunction and trip up? I'm not a Windows guy but is this issue even Windows related? The only other application we have running on this server is CatTools and it runs clean with no service issues. The systems team has taken a look at the server and believe this to be related only to the Kiwi application itself.
I too would like to know if this issue has been resolved, and if so what was done. We are logging so many messages Kiwi keeps stopping. We are required to log these messages because of audit regulations and we have multiple firewalls logging to this one server. If Kiwi cannot keep up does anyone have any other suggestions since we have to log these messages.
However, STOPs have happened back to version 7.2. And we push our servers ridiculously hard. The highest count I've seen lately was 208 million messages in 24 hours. The server handled it fine, no messages lost.
The diagnostics will show you some basic stats for the server itself, top talkers, dns stats, static host entries, and various message stats. If you scroll down, towards the bottom half of the report, you should find some stats relating to message buffers. I would check those first, and see how if you have any overflow messages, and what percentage free is available. I have had numerous different issues cause the service to stop. While I have not performed the same actions you have, the last time I ran into this issue, I was simply adding a new rule. Another time, they narrowed it down to a database issue, as I had several rules dumping data into different tables in the same database.
I had a similar problem except I couldn't get kiwi syslog server running on w2k12R2 server that was also a DC... we're going to move it to a windows 7 host instead as a solution. I couldn't get the service to start and stay running at all.
Has anyone successfully managed to use a netscaler to load balance UDP syslog traffic from various sources to multiple Syslog receivers (HA) using a Netscaler. We thought it would be pretty simple but looking into it, it isn't as straight forward as we first thought.
I need to secure Syslog sending from Palo devices to SolarWinds Kiwi Syslog server using SSL. We're currently sending Syslog to the Kiwi Server over UDP successfully without issue. However, when I changed the transport to SSL (6514) and set the certificate to use for Syslog, the firewall stopped sending logs to the Kiwi server.
I followed the steps outlined here (Configure Syslog Monitoring (paloaltonetworks.com)). I created two self-signed certificates on the firewall, I assigned one to be used for Syslog sending, and exported the second to the Kiwi server.
- (I don't have experience with Kiwi syslog, but) From your screenshot it looks like you have defined what server certificate will Kiwi use to authenticate itself to the FW. But where are you defining which CA Kiwi will use to verify the client certificate that FW will use to authenticate to the server?
- In any case I would expect your packet capture to catch at least some TCP SYNs from FW to the syslog. If you are using the dedicate mgmt interface try to capture any traffic (limiting the noise from your ssh session):
I could not get my sonicwall NSA2400 to log to a syslog server. I used Kiwi 9.4.1 Free version and no matter what i did it would not log the messages. I followed the steps in the following article with no luck
A syslog server is a logging server that allows for the centralized collection of syslog messages, known as events, from a variety of networking devices such as routers, switches, and firewalls, in addition to servers running a variety of operating systems.
Universal log collection and routing
syslog-ng flexibly routes log data from X sources to Y destinations. Instead of deploying multiple agents on hosts, organizations can unify their log data collection and management.
Secure data archive
syslog-ng Store Box provides automated archiving, tamper-proof encrypted storage, granular access controls to protect log data. The largest appliance can store up to 10TB of raw logs.
SolarWinds Kiwi Syslog Server is ranked 31st in Log Management with 4 reviews while syslog-ng is ranked 17th in Log Management with 5 reviews. SolarWinds Kiwi Syslog Server is rated 7.8, while syslog-ng is rated 8.6. The top reviewer of SolarWinds Kiwi Syslog Server writes "Reliable, straightforward deployment, with good management and filters". On the other hand, the top reviewer of syslog-ng writes "Consistent in delivering data, stable, and scalable". SolarWinds Kiwi Syslog Server is most compared with SolarWinds Log Analyzer, Fortinet FortiAnalyzer, Graylog, Wazuh and ManageEngine EventLog Analyzer, whereas syslog-ng is most compared with Graylog, Grafana Loki, Fortinet FortiAnalyzer, Logstash and Elastic Security. See our SolarWinds Kiwi Syslog Server vs. syslog-ng report.
I have setup the Kiwi Syslog Server where I'm collecting the Sonicwalls Firewall traffic logs, but I want to access that logs through any API or want to send on elasticsearch. Is there any way to setup the logstash and elasticsearch to collect firewall logs from the kiwi syslog server where we are collecting the logs?
You can use the udp, tcp or syslog input to do this, the main difference is that using the syslog input it will help with the parsing, but the syslog message must follows the format specified in the RFC, I'm not sure if this is the case with Kiwi.
Currently all routers that I need to monitor log to a Kiwi syslog server. Due to network constraints, logs can't be forwarded to the Arcsight syslog smartconnector so I want to forward those logs from Kiwi. I read through the other discussions on the topic of forwarding logs from Kiwi to an Arcsight syslog smartconnector, but can't seem to solve my problem. Kiwi syslog server has been configured to forward logs to the syslog smartconnector over port 514/udp, (Action: Forward to another host) the correct connector host server is listed, and all checks are in the correct boxes, but I don't see any logs in Arcsight when I run a channel for the Syslog smartconnector. How do I check if data is being received by the Arcsight smartconnector but not showing up in the management console? Or check for an error message? Any help will be greatly appreciated. Thanks.
I confirmed that the kiwi sylog server is receiving logs from the routers on the network. I had the network engineer send a test message from Kiwi to Arcsight. I see the message in Arcsight. The agent.default.properties file listed under the syslog connector does have an entry for Kiwi. Is this correct? I found a different thread that displayed the second line as "Kiwi_Syslog_Server". Does this make a difference?
Two main components of a Syslog system are Syslog servers and Syslog clients. A Syslog server is a Unix/Linux/Windows server, which is running a Syslog server product. Syslog clients (Cisco Routers / Cisco Switches / ASA Firewalls) forward the Syslog messages to the Syslog server and Syslog server receives and stores thos Syslog messages for future auditing.
Many Syslog server applications are available. GNU public licence based free Syslog server products are also available. Click the following link to download a free Syslog Server from sourceforge.net.
Step 1 : Run the Kiwi Syslog Server installation file on the machine which you want to make a Syslog Server. Click "I Agree" to agree the software licensing terms and to continue Kiwi Syslog server installation.
Step 2: Select the operating mode of Kiwi Syslog Server. You can run Kiwi Syslog Server as an Application or as a Service. If you install Kiwi Syslog Server as Service in Windows Server, we can configure the service to run automatically when the server boot up.
Network management, particularly the effective handling of system logs, is crucial in maintaining a high-performance and secure IT infrastructure. Log files, or simply logs, are generated by network devices such as switches and routers, serving as valuable resources to understand the intricacies of network performance, spot anomalies, and even comply with regulatory requirements. One popular method to manage this data is using a Syslog server, a dedicated system that aggregates, stores, and analyzes these logs.
Once your Cisco switch is configured to send syslog messages to Kiwi Syslog Server, you can start monitoring and analyzing the logs. Kiwi Syslog Server provides a user-friendly interface with various tools and features to help you manage and understand your logs:
df19127ead