You can set them up as a failover pair, with one active or a load balanced pair with both active and shared load. We configure ours(3 servers) as a load balanced set with all servers active. Then there are 2 other servers in remote locations that normally handle only the local logs. In the event of a failure of more than 1 of the 3 server set the remote servers become active in the cluster to help with the load. Because of distance and traveling over WAN links we try to minimize their usage in the LB cluster.
You could lose some messages during the transition but unless it's under heavy load it will be minimal. This is dependent on the configuration of the load balance and how quickly it will detect a down Kiwi server. Ours takes about 3 seconds max to transition fully. At our average load this could mean 300 or so dropped messages.
Yes, anything written to the local servers is unavailable while that server is offline. You can write to a network share, I personally don't recommend it. Write locally and copy/archive to network shares. DFS is an option for replication. You can also create a rule to forward the messages to the other server. I also don't recommend this. In high message count environments you should try to minimize forwarding rules as they are an additional load on the Kiwi server engine. Forwarding all messages effectively doubles your message count and halves your capacity. Your rules could also write to the other server/locations via a share. I'd be cautious with this as you don't want those writes to potentially slow your Kiwi server processing.
If I test the configuration, I can see the test messages in the location noted about. However, after I apply the settings, the older location (a CIFS share) continues to receive the actual syslogs of the devices we monitor.
I do see the syslog packets coming in from the ASA to my syslog server when running wireshark on the syslog server. But nothing is registering in the Kiwi syslog server application. Sounds like I need to consult that community (SolarWinds) instead. Unless anyone else has any helpful insights?
I've configured the firewall to report to a syslog server but nothing comes through. I've tried disabling the firewall on the desktop/server and still nothing is reported from the Sophos firewall. I've also use the servers built in test message to verify it is working.
TCPDUMP was surprisingly easy to use. I ran it and do see entries for port 514 though I can't tell if they are UDP or TCP. Just to be sure, I set the port in Kiwi to both 514 udp and tcp and still I see nothing in Kiwi syslog. I turned off the computer firewall. I don't think it is an issue with Sophos. I give up.
More or less, yes. It's a pretty straight-forward setup, except that you may have to tweak the Kiwi forwarding configuration. You must be sure it follows the standard syslog format in the forwarded events or you could have a problem. You'll need an ArcSight syslog daemon connector running as the recipient.
Now, that said, there are a couple of other points to keep in mind. First, some device types don't include their own IP address in the event, and when those events are sent directly to a connector, the connector can pull the IP address from the packet header to compensate. If Kiwi forwards events like that where the original source isn't present, you will wind up with no device address or with the Kiwi server's own address in the event. There is an option within Kiwi (I forget where it is) that says to append the original sender's address, but it could take some tuning to get the event formatted correctly so that ArcSight parses it right.
Kiwi writes all events to a local file. If you tweak the settings for how events are formatted, you might be able to point the ArcSight syslog file connector at it and read it that way. I've never tried it, but you might have success with it.
I have setup the Kiwi Syslog Server where I'm collecting the Sonicwalls Firewall traffic logs, but I want to access that logs through any API or want to send on elasticsearch. Is there any way to setup the logstash and elasticsearch to collect firewall logs from the kiwi syslog server where we are collecting the logs?
You can use the udp, tcp or syslog input to do this, the main difference is that using the syslog input it will help with the parsing, but the syslog message must follows the format specified in the RFC, I'm not sure if this is the case with Kiwi.
Thanks reecardo. I'm looking for a way to get the workflow engine itself to forward to an external syslog analysis setup (something like an ELK Stack). I think the component library you suggest would need to be included and used in every workflow project?
Network management, particularly the effective handling of system logs, is crucial in maintaining a high-performance and secure IT infrastructure. Log files, or simply logs, are generated by network devices such as switches and routers, serving as valuable resources to understand the intricacies of network performance, spot anomalies, and even comply with regulatory requirements. One popular method to manage this data is using a Syslog server, a dedicated system that aggregates, stores, and analyzes these logs.
Once your Cisco switch is configured to send syslog messages to Kiwi Syslog Server, you can start monitoring and analyzing the logs. Kiwi Syslog Server provides a user-friendly interface with various tools and features to help you manage and understand your logs:
08ab062aa8