1
0
mirror of synced 2025-12-19 18:10:59 -05:00
Files
docs/content/admin/monitoring-activity-in-your-enterprise/exploring-user-activity/log-forwarding.md
2023-06-23 10:45:10 -07:00

3.1 KiB

title, intro, redirect_from, versions, type, topics
title intro redirect_from versions type topics
Log forwarding {% data variables.product.product_name %} uses `syslog-ng` to forward {% ifversion ghes %}system{% elsif ghae %}Git{% endif %} and application logs to the server you specify.
/enterprise/admin/articles/log-forwarding
/enterprise/admin/installation/log-forwarding
/enterprise/admin/enterprise-management/log-forwarding
/admin/enterprise-management/log-forwarding
/admin/user-management/log-forwarding
/admin/user-management/monitoring-activity-in-your-enterprise/log-forwarding
ghes ghae
* *
how_to
Auditing
Enterprise
Logging
Security

About log forwarding

Any log collection system that supports syslog-style log streams is supported (e.g., Logstash and Splunk).

When you enable log forwarding, you must upload a CA certificate to encrypt communications between syslog endpoints. Your appliance and the remote syslog server will perform two-way SSL, each providing a certificate to the other and validating the certificate which is received.

Enabling log forwarding

{% ifversion ghes %}

  1. On the {% data variables.enterprise.management_console %} settings page, in the left sidebar, click Monitoring.
  2. Select Enable log forwarding.
  3. In the Server address field, type the address of the server to which you want to forward logs. You can specify multiple addresses in a comma-separated list.
  4. In the Protocol drop-down menu, select the protocol to use to communicate with the log server. The protocol will apply to all specified log destinations.
  5. Optionally, select Enable TLS. We recommend enabling TLS according to your local security policies, especially if there are untrusted networks between the appliance and any remote log servers.
  6. To encrypt communication between syslog endpoints, click Choose File and choose a CA certificate for the remote syslog server. You should upload a CA bundle containing a concatenation of the certificates of the CAs involved in signing the certificate of the remote log server. The entire certificate chain will be validated, and must terminate in a root certificate. {% elsif ghae %} {% data reusables.enterprise-accounts.access-enterprise %} {% data reusables.enterprise-accounts.settings-tab %}
  7. Under {% octicon "gear" aria-label="The Settings gear" %} Settings, click Log forwarding.
  8. Under "Log forwarding", select Enable log forwarding.
  9. Under "Server address", enter the address of the server you want to forward logs to.
  10. Select the "Protocol" dropdown menu and click a protocol.
  11. Optionally, to encrypt communication between syslog endpoints using TLS, select Enable TLS.
  12. Under "Public certificate", paste your x509 certificate.
  13. Click Save. {% endif %}

{% ifversion ghes %}

Troubleshooting

If you run into issues with log forwarding, contact {% data variables.contact.contact_ent_support %} and attach the output file from http(s)://[hostname]/setup/diagnostics to your email. {% endif %}