On this page
Configuring Strata Cloud Manager Syslogs
Overview
This topic explains how to configure log forwarding from the Strata Logging Service in the Strata Cloud Manager (SCM) tenant to send encrypted syslogs to TOS.
This procedure can be performed using a custom PKI or a public CA.
Custom PKI procedure
This configuration uses TLS with a custom PKI, an OCSP responder, and a syslog VIP in TOS.
The process includes:
-
Creating certificates
-
Configuring an OCSP responder
-
Importing certificates into TOS
-
Configuring the syslog VIP
-
Configuring the Strata Logging Service
-
Adding the Strata CA to TOS
During this procedure you will be asked to verify the results of the commands you ran. If you are unable to verify them successfully, contact Support.
Public certificate procedure
This procedure requires that your syslog VIP be configured with a public CA.
-
Configuring the Strata Logging Service
-
Adding the Strata CA to TOS
For additional information about configuring log forwarding in Strata Cloud Manager, see the Palo Alto Strata documentation:
Prerequisites
-
TOS R25-2 PHF3 and later
-
Palo Alto Strata Cloud Manager with the Strata Logging Service
-
A TOS VIP for syslog traffic
-
External IP address reachable from Strata Cloud Manager (for OCSP and syslog)
Configure SCM syslogs using a custom PKI
If you are using a public CA, skip to Configure the Strata Logging Service.
Create certificates
-
On the TOS Primary data node, create a local PKI directory structure (based on openSSL)
-
Create the OpenSSL configuration.
-
<syslog-external-ip> with the SecureTrack syslog VIP.
-
<tos-external-ip> with the external TOS IP that need to be reachable from the SCM tenant on port 2560.
-
Create the root certificate authority (CA).
The CA key is encrypted with a passphrase. It is used for signing and not actually imported into TOS.
-
Run the following command:
-
Generate an encrypted CA key.
-
Create the CA certificate. Enter the CA passphrase when prompted.
-
Verify that the certificate was created.
The output should show.
-
-
Create a dedicated certificate for the OCSP responder. This certificate is signed by your root CA and is used by the OCSP service to sign responses.
-
Run the following command:
-
Generate an OCSP key.
-
Create the certificate signing request (CSR).
-
Sign the OCSP key with the CA certificate. Enter the CA passphrase when prompted.
-
Verify that the OCSP certificate was created properly.
-
If you receive the following error, run the following command and repeat steps d and e.
The output should show: OCSP Signing
-
-
Create the server certificate.
The server key is not encrypted. TOS requires that all key be unencrypted.
-
Run the following command:
-
Generate the server key.
-
Create the certificate signing request (CSR).
-
Sign the CSR with the CA certificate. Enter the CA passphrase when prompted.
-
Verify that the OCSP Authority Information Access (AIA) is available.
-
Verify that a SAN certificate is available.
Replace syslog-external-IP with the SecureTrack syslog VIP.
The output should show: CSP - URI:http://<tos-external-ip>:2560.
The output should show: IP Address:<syslog-external-ip>
-
export PKI="/root/certificates/pki"
mkdir -p $PKI/{certs,private,ocsp,newcerts}
chmod 700 $PKI/private
touch $PKI/index.txt
echo 1000 > $PKI/serial
cat > $PKI/openssl.cnf <<'EOF'
[ ca ]
default_ca = CA_default
[ CA_default ]
dir = /root/certificates/pki
database = $dir/index.txt
new_certs_dir = $dir/newcerts
certificate = $dir/certs/ca.cert.pem
serial = $dir/serial
private_key = $dir/private/ca.key.pem
default_md = sha256
policy = policy_loose
email_in_dn = no
copy_extensions = copy
default_days = 365
[ policy_loose ]
commonName = supplied
[ server_cert ]
basicConstraints = CA:FALSE
keyUsage = digitalSignature,keyEncipherment
extendedKeyUsage = serverAuth
subjectAltName = IP:<syslog-external-ip>
authorityInfoAccess = @aia
[ ocsp ]
basicConstraints = CA:FALSE
keyUsage = digitalSignature
extendedKeyUsage = OCSPSigning
[ aia ]
OCSP;URI.0 = http://<tos-external-ip>:2560
EOF
Replace:
Set up the OCSP responder
-
On the TOS primary data node, create the systemd service.
cat > /etc/systemd/system/ocsp.service <<'EOF'
[Unit]
Description=OCSP Responder for Secure Syslog
After=network.target
[Service]
ExecStart=/usr/bin/openssl ocsp \
-index /root/certificates/pki/index.txt \
-port 2560 \
-rsigner /root/certificates/pki/ocsp/ocsp.cert.pem \
-rkey /root/certificates/pki/private/ocsp.key.pem \
-CA /root/certificates/pki/certs/ca.cert.pem \
-text
Restart=always
RestartSec=10
[Install]
WantedBy=multi-user.target
EOF -
Start the OCSP service.
-
Verify that the OCSP service is listening.
-
Test the OCSP locally.
-
Expected output:
-
Response is
verify OK. -
certs/server.crt.pem: good
-
The output should show: LISTEN on port 2560
Import certificates into TOS
-
On the primary data node, go to /root/certificates/pki.
-
Import the certificates into TOS.
-
Verify that a secret key was created.
-
Configure the syslog VIP.
-
Verify the service is running.
-
Verify the pod is running.
Verify OCSP, certificates and Syslog configuration
Verify the following:
-
OCSP service running and listening on 2560
-
OCSP accessible from external: <tos-external-ip>
-
Certificates imported to TOS
-
Syslog VIP configured for TCP
-
NGINX container running (5/5)
Configure Strata Logging Service (Part 1)
Configuring the Strata Logging Service requires performing actions in both the SCM tenant and the TOS primary data node.
-
Log in to Strata Cloud Manager.
-
Create a syslog profile.
-
Configure the following settings:
- Name: tufin-syslog
- Syslog Server: <syslog-external-ip>
- Port: 6514
- Facility: LOG_USER
-
Under Server Authentication, upload the server certificate: /root/certificates/pki/certs/ca.crt.pem
This can be either a public CA or the custom CA certificate you created in the previous section.
-
Download the Strata CA Cert chain, and then continue to the next section.
Add the certificates to TOS
Custom PKI
-
Send the Strata CA cert chain to TOS.
-
On the primary data node go to /root.
-
Extract the root CA.
-
Combine the root CA with the Strata CA cert chain.
-
Verify that both certificates are on the machine.
-
Update the NGINX secret key.
-
Restart syslog-agent-service.
-
Wait for the pod to be ready.
Public CA
-
Send the Strata CA cert chain to TOS.
-
On the primary data node go to /root.
-
Update the NGINX secret key.
-
Restart syslog-agent-service.
-
Wait for the pod to be ready.
Configure Strata Logging Service (Part 2)
-
Go back to the SCM tenant, and test the connection in the syslog profile you created.
If you created a custom CA and the test fails, verify that the OCSP responder can be accessed by Strata.
-
Enter the Profile Token.
You will need the Profile Token when adding the SCM tenant to TOS.
-
Select the log types to forward:
- firewall_traffic
- system
- config
TOS supports CEF and LEEF syslog formats. -
Save your changes to the SCM tenant.
Verify TOS is receiving syslog traffic
-
On the TOS primary data node, check that you are receiving encrypted traffic.
-
Check that you are receiving decrypted traffic.
-
Check NGINX logs.
-
Verify that the following messages are not displayed:
-
client sent no required SSL certificate
-
SSL_shutdown() failed
-
certificate verify failed
You should see encrypted TLS traffic from Strata Cloud Manager..
You should see decrypted syslog messages forwarded to TOS
You should see file sizes increasing, files being processed and then being deleted.
Troubleshooting
Issue: 'Test Connection' Fails in Strata
-
Test OCSP connection from an external location:
-
Check the OCSP service
-
Check the server certificate.
Output must show: OCSP - URI:http://<tos-external-ip>:2560
Issue: No Traffic on Port 10514
There is traffic on port 6514, but no traffic on port 10514.
Cause: Strata CA not added to NGINX.
Solutions:
-
Verify combined CA has both certificates
-
Check NGINX logs
kubectl get secret syslog-agent-nginx-secret -o jsonpath='{.data.ca\.crt}' | \
base64 -d | grep -c "BEGIN CERTIFICATE"
Output should show two certificates. If you see only one certificate, repeat the steps in Add the Strata CA.
If the output shows client sent no required SSL certificate, repeat the steps in Add the Strata CA.
Issue: OCSP Service Fails to Start
-
Check key permissions.
-
Check the service logs.
Output should show: -rw------- (600)
If the output is different, run the following command:
Issue: Syslog Files Stay at 0 Bytes
Cause: NGINX rejecting connections.
Solution:
-
Check for NGINX errors.
-
Check for SSLor certificate errors. The error message indicates what needs to be fixed.
Was this helpful?
Thank you!
We’d love your feedback
We really appreciate your feedback
Send this page to a colleague