The proposed steps have not been officially qualified by RSA and must be tested prior to any production use.
Note that during Quick Setup another user name may have been selected. Use that user name to login.
sudo su -
am81p:~ # cd /etc/syslog-ng
am81p:/etc/syslog-ng # cp syslog-ng.conf syslog-ng.conf.ORIG
#destination logserver { udp("10.10.10.10" port(514)); };
#log { source(src); destination(logserver); };
The IP address of 192.168.100.100 is used only as an example for the IP address of a remote syslog server.
destination logserver { udp("192.168.100.100" port(514)); };
log { source(src); destination(logserver); };
destination logserver {
udp("192.168.100.100" port(514));
udp("192.168.27.130" port(514));
udp("192.168.67.143" port(514));
};
log { source(src); destination(logserver); };
am81p:/etc/syslog-ng # /etc/init.d/syslog restart
Shutting down syslog services done
Starting syslog services done
am81p:/etc/syslog-ng #
tcpdump -i eth0 -Z root -n -A -v "dst host n.n.n.n and dst port 514"
Making the change to the /etc/syslog-ng/syslog-ng.conf configuration file is a custom change and must be noted when writing up the a disaster recovery plan for all authentication manager instances deployed for production usage.
This configuration allows the Authentication Manager instance to push its data into the /var/log/messages file and all of the data being written to /var/log/messages is pushed out to the remote syslog servers. Further research will be required to filter outgoing data to the remote syslog servers.
For Authentication Manager v8.4 or later, check the following article:
How to configure RSA Authentication Manager 8.4 or later to send data to multiple remote syslog servers