Link Search Menu Expand Document

Overview

The most straightforward way to send events to Panther is to install and configure compatible logging software on the client system.

While users should generally install the software according to the documentation published by the relevant providers, specific configuration is also required to enable communication with Panther.

This page provides a guide to the configuration required once the logging software has been installed. (Please note that the instructions here are based on clean installations of the logging software – if site-specific configurations have already been made, then it is necessary to download the Panther resources and integrate them following the providers’ documentation.)

All users should read the general advice in the introduction, but then refer to the relevant sections for their own specific software.

Introduction

Event data is sent securely to the Panther server from local clients via an encrypted connection using Transport Layer Security (TLS). This requires the use of certificates and unique client keys which are generated specifically for your Panther instance during the sign-up process.

Since these certificates and keys are needed to configure client event loggers, they are bundled into “configuration archives” along with sample configuration files specific to the software, and made available for download by Panther.

You should ensure that the client.key included in your configuration archive is kept securely to prevent its use by anyone else.

The configuration process therefore is to download an appropriate archive, to load it in a suitable location for the software, and to carry out any remaining package or system specific tasks.

Downloading Configuration Archive

The configuration archives are available on the Admin page. Select this using the tab from the main menu at the top of the Panther page.

Select the admin page

The drop-down selector offers archives for the supported software and operating systems.

Download the configuration archive

Select the appropriate option for your client and click the Download button.

The archives are downloaded in an appropriate format for each system: Linux archives are provided in uncompressed tar format, while Windows archives are built using zip.

(Note that the same certificates and keys are provided in each archive, so for custom configurations the choice of download is unimportant.)

Rsyslog Configuration

For complete information on configuring rsyslog, please consult the official guides for rsyslog.

Major distributions include rsyslog in their standard repositories, so please either follow your system’s guidelines to install and enable it, or visit the official website.

Once rsyslog is installed, the necessary steps to integrate it with Panther are:

Install GNU-TLS support for rsyslog

On GNU/Linux systems, rsyslog uses the GnuTLS library to provide its TLS functionality. This is classed as an optional dependency on some distributions, and is therefore not always installed automatically by the package manager. Where this is the case, the TLS package may have to be added explicitly along with the main rsyslog package.

Debian / Ubuntu

# apt-get install rsyslog-gnutls

RedHat / CentOS

# yum install rsyslog-gnutls

Install the configuration files

The downloaded resources in rsyslog-config-linux.tar need to be installed into the system rsyslog configuration directory.

The following commands will extract the archive into /etc/rsyslog-client.d, creating it if necessary. If the directory already exists, then make a backup of it before extracting the archive in case any previously configured files are overwritten.

[root@localhost ~]# cd /etc
[root@localhost /etc]# tar -xvf /path/to/rsyslog-config-linux.tar

Edit the main rsyslog configuration

Once the new configuration files have been installed, the main system rsyslog configuration file must be updated in order to reference them.

Edit /etc/rsyslog.conf and make sure that it contains a line like this to read the Panther configuration files extracted from the archive above:

$IncludeConfig /etc/rsyslog-client.d/*.conf

Restart rsyslog

The new configuration should take effect automatically when the system is next rebooted, but it is also possible to restart rsyslog to have the changes take effect immediately.

systemd based systems

Systems using the newer systemd service manager, such as Ubuntu 18 and CentOS 7, can restart the rsyslog service as follows:

# systemctl restart rsyslog

init.d based systems

Systems using the older System V init service management scripts can generally restart the rsyslog service as follows:

# /etc/init.d/rsyslog restart

NXLog Configuration (Linux)

Install the NXLog Community Edition from the official website following the deployment guide.

Once installed, the steps to integrate NXLog with Panther are:

Install the configuration files

To begin with, download the configuration archive as described above. The downloaded resources in nxlog-config-linux.tar then need to be installed into the system NXLog configuration directory.

The following commands will extract the archive into /etc/nxlog, which should have been created during the NXLog installation. Note that any existing nxlog.conf will be overwritten, so make a backup if one already exists.

[root@localhost ~]# cd /etc/nxlog
[root@localhost /etc/nxlog]# tar -xvf /path/to/nxlog-config-linux.tar

Apart from overwriting the main nxlog.conf, this will extract the required certificates and key files into a new panther sub-directory.

Restart NXLog

If NXLog has been installed according to the deployment guide, then it should restart automatically following a system reboot.

In order to have the new configuration take immediate effect, it is also possible to restart NXLog immediately. While systemd systems such as Ubuntu and CentOS are supported, at the time of writing the service management interface for NXLog is implemented as a wrapper around the System V init scripts.

This means that, on both systemd and init based systems, it is possible to restart NXLog by calling the init script directly:

[root@localhost /etc/nxlog]# /etc/init.d/nxlog restart

NXLog Configuration (Windows)

Download the Windows installer for the NXLog Community Edition from the official website.

Install the package by running the installer, but also see the deployment guide.

Once installed, the steps to integrate NXLog with Panther are:

Install the configuration files

Once the Windows configuration archive has been downloaded as described above, the contents of nxlog-config-windows.zip must be overlaid onto the base directory of the installed NXLog package. If the default install options were used, this will normally be C:\Program Files (x86)\nxlog.

Opening this directory with the Windows File Explorer will show that it contains cert and conf sub-directories, among others. While the cert directory should be empty, the conf directory may contain a sample nxlog.conf, which should be renamed nxlog.dist in order to prevent any clash with the new configuration.

Extract the downloaded nxlog-config-windows.zip Panther configuration archive by clicking on it and selecting the extract to option, specifying the base directory NXLog was installed into – normally C:\Program Files\nxlog – containing the cert and conf sub-directories.

This will copy the certificates and key files into the empty cert directory, along with a new nxlog.conf into the conf directory. Note that the system may ask for confirmation when writing to the cert directory, owing to its permissions.

Restart NXLog

The NXLog installer should have configured the service to be started automatically on the next system boot.

From the NXLog documentation, it is also possible to start the service directly from the services console, or from the command line interface by navigating to the install directory and running nxlog.exe -f. This last option may assist in initial debugging.