Syslog TLS to Cribl.Cloud (Palo Alto Example)
This guide explains how to securely forward syslog data to your Cribl.Cloud instance using Transport Layer Security (TLS). Properly configured TLS encryption ensures that sensitive log data is protected during transmission across networks.
Benefits of TLS-Encrypted Syslog
- Data Security: Encrypts sensitive log data during transmission.
- Integrity Verification: Ensures data hasn’t been tampered with during transit.
- Compliance: Helps meet security requirements for regulated industries.
- Authentication: Verifies the identity of your Cribl.Cloud instance.
General Configuration Steps
Follow these steps to set up your connection.
Determine Your Cribl.Cloud Ingest Address
Before configuring your syslog sender, you’ll need to identify your Cribl.Cloud ingest address:
- Log into your Cribl.Cloud portal.
- From the top nav, select Workspace.
- In the sidebar, select Access.
- Note the Public Ingress address (for example,
default.main.<OrganizationID>.cribl.cloud
).
Obtain Cribl.Cloud CA Certificates
Cribl.Cloud uses Google Trust Services (GTS) certificates to secure connections. You have the following two options.
Use Trusted Public Certificate Authorities (Recommended)
Most systems already trust Google Trust Services certificates, so no additional certificate configuration may be necessary if your system’s trust store is up to date.
Manually Import Google Trust Services Certificates
Google Trust Services publishes the necessary certificates in a user-friendly repository. Follow these steps to download the required certificates:
- Visit the Google Trust Services Root Repository.
- Download the following certificates:
GTS Root R1
(PEM format): This is the root certificate for Google Trust Services.- Fingerprint:
d9:47:43:2a:bd:e7:b7:fa:90:fc:2e:6b:59:10:1b:12:80:e0:e1:c7:e4:e4:0f:a3:c6:88:7f:ff:57:a7:f4:cf
- Fingerprint:
WR1
(PEM format): This is the intermediate certificate issued by Google Trust Services.- Fingerprint::
b1:0b:6f:00:e6:09:50:9e:87:00:f6:d3:46:87:a2:bf:ce:38:ea:05:a8:fd:f1:cd:c4:0c:3a:2a:0d:0d:0e:45
- Fingerprint::
You only need to download these certificates once.
Next, import these certificates into your syslog sender’s trust store.
Configure Your Syslog Sender
The following are general steps for configuring a syslog sender (specific steps vary by vendor):
- Configure a new syslog server profile/destination.
- Set the protocol to
TLS/SSL
(not TCP). - Use port
6514
for TLS-encrypted syslog. - Set the destination address to your Cribl.Cloud ingest address.
- Configure the appropriate log format (typically BSD syslog).
- Enable certificate validation using your system’s trust store or imported certificates.
Vendor-Specific Configuration: Palo Alto Example
Panorama management appliances give you insights into what is happening behind your Palo Alto Networks firewalls, including details about applications, URLs, threats, data files, and patterns. By forwarding logging data directly from Palo Alto firewalls or Panorama management appliances to your Cribl.Cloud instance, you can shape, process, search, and route the data to the analytics platform of your choice.
This section outlines how to configure your Palo Alto Networks firewalls or Panorama management appliances to connect securely to your Cribl.Cloud instance using Google Trust Services (GTS) as the Certificate Authority (CA).
Import Trusted Roots into PAN
Download the GTS certificate certificate as outlined above. Next, import the certificates into PAN. In the PAN OS:
- Go to Device > Certificate Management > Certificates.
- Select the Import button at the bottom.
- The Import Certificate configuration modal appears. Import both downloaded certificates (
GTS Root R1
andWR1
). - Once you have imported both certificates, go to the Device Certificates table and select the blue link for each certificate you just imported.
- Select the Trusted Root CA check box for each certificate.
Configure the Syslog Server Profile
Now that you’ve imported the trusted certificates, proceed with creating a new Syslog Server Profile:
After importing the certs, navigate to Device > Server Profiles > Syslog.
Create a new Syslog Server Profile.
If you’re using Syslog over TLS, make sure to set the profile to use SSL instead of TCP.
Even if a PAN rule does not explicitly reference the TLS certificate that you added from Cribl, TLS will detect the certificate information and use it correctly.
Configure the Syslog server field with your Cribl.Cloud Organization’s ingest address. To find your ingest address, navigate to your Cribl.Cloud portal and select the gear ⚙️ on the top bar.
Select Network Settings and choose the Worker Group you’re sending data to. For example, sending to the default Group your ingest address would look like:
default.main.<OrganizationID>.cribl.cloud.
Configure Log Settings to Use the Syslog Profile
Next, configure your log settings to use the Syslog Profile.
- Go to Device > Log Settings.
- Ensure the desired log types are configured to use the newly created Syslog Server Profile.
Configure Firewall Rule Log Forwarding
To selectively forward specific log types, create a Log Forwarding Profile and define the rules for which traffic should be forwarded.
- Use the Log Forwarding Profile to create a ruleset and configure the appropriate log types to be forwarded.
- Go to Objects > Log Forwarding and configure each relevant section with the appropriate settings.
Forward Admin Activity Logs
For additional context, you can forward your admin activity logs:
- Go to Device > Setup > Management, and select the gear ⚙️ in the Logging and Reporting settings.
- Enable the Debug and Operational Commands and UI Actions, and choose the appropriate Syslog server.
Customize OCSP Validation Settings for the syslog-ng
Process
If the certificate validation fails, follow these steps to customize the validation settings for the syslog-ng
process. This requires shell access to your device.
These commands are for an individual PAN OS device and might differ for Panorama. Refer to the official PAN-OS documentation for specific instructions on your version.
set syslogng ssl-conn-validation all-conns skip
set syslogng ssl-conn-validation explicit OCSP skip CRL skip EKU skip
Validation
To validate whether you have successfully set up the TLS-encrypted Syslog, check the logs on your PAN OS.
Troubleshooting
If you run into issues not anticipated above, you can use some of the following commands to further diagnose them:
# restart the syslog-ng process
debug syslog-ng restart
# see syslog-ng process logs
tail follow yes mp-log syslog-ng.log
# get stats for processes
debug log-receiver statistics
debug syslog-ng stats
# tcpdump activity on the syslog port and view the results
# note: control-c to exit the tcpdump, it will not show anything on the cli when running
tcpdump filter "port 6514" snaplen 0
view-pcap mgmt-pcap mgmt.pcap