You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/_admin-guide/100_TLS-encrypted_message_transfer/002_Mutual_authentication_using_TLS/000_Configuring_mutual_TLS_client.md
+9-7Lines changed: 9 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -17,16 +17,15 @@ syslog() driver):
17
17
1. Create an X.509 certificate for the {{ site.product.short_name }} client.
18
18
19
19
2. Copy the certificate (for example, client_cert.pem) and the
20
-
matching private key (for example, client.key) to the syslog-ng
20
+
matching private key (for example, client.key) to the {{ site.product.short_name }}
21
21
client host, for example, into the
22
22
/opt/syslog-ng/etc/syslog-ng/cert.d directory. The certificate must
23
-
be a valid X.509 certificate in PEM format. If you want to use a
24
-
password-protected key, see
25
-
Password-protected keys.
23
+
be a valid X.509 certificate in PEM format. The key must be in PEM format.
24
+
If you want to use a password-protected key, see Password-protected keys.
26
25
27
-
3. Copy the CA certificate of the Certificate Authority (for example,
28
-
cacert.pem) that issued the certificate of the {{ site.product.short_name }} server (or
29
-
the self-signed certificate of the {{ site.product.short_name }} server) to the
26
+
3. Copy the CA certificate (for example, cacert.pem) of the Certificate
27
+
Authority that issued the certificate of the {{ site.product.short_name }} server
28
+
(or the self-signed certificate of the {{ site.product.short_name }} server) to the
30
29
{{ site.product.short_name }} client hosts, for example, into the
31
30
/opt/syslog-ng/etc/syslog-ng/ca.d directory.
32
31
@@ -49,6 +48,9 @@ syslog() driver):
49
48
Include the client\'s certificate and private key in the tls()
50
49
options.
51
50
51
+
For the details of the available tls() options, see
52
+
TLS options.
53
+
52
54
Example: A destination statement using mutual authentication
53
55
54
56
The following destination encrypts the log messages using TLS and
Copy file name to clipboardExpand all lines: doc/_admin-guide/100_TLS-encrypted_message_transfer/002_Mutual_authentication_using_TLS/001_Configuring_mutual_TLS_server.md
+10-12Lines changed: 10 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -11,12 +11,16 @@ Complete the following steps on the {{ site.product.short_name }} server:
11
11
12
12
## Steps
13
13
14
-
1. Copy the certificate (for example, syslog-ng.cert) of the syslog-ng
15
-
server to the {{ site.product.short_name }} server host, for example, into the
14
+
1. Create an X.509 certificate for the {{ site.product.short_name }} server.
15
+
16
+
2. Copy the certificate (for example, syslog-ng.cert) and the
17
+
matching private key (for example, syslog-ng.key) to the {{ site.product.short_name }}
18
+
server host, for example, into the
16
19
/opt/syslog-ng/etc/syslog-ng/cert.d directory. The certificate must
17
-
be a valid X.509 certificate in PEM format.
20
+
be a valid X.509 certificate in PEM format. The key must be in PEM format.
21
+
If you want to use a password-protected key, see Password-protected keys.
18
22
19
-
2. Copy the CA certificate (for example, cacert.pem) of the Certificate
23
+
3. Copy the CA certificate (for example, cacert.pem) of the Certificate
20
24
Authority that issued the certificate of the {{ site.product.short_name }} clients to
21
25
the {{ site.product.short_name }} server, for example, into the
22
26
/opt/syslog-ng/etc/syslog-ng/ca.d directory.
@@ -32,17 +36,11 @@ Complete the following steps on the {{ site.product.short_name }} server:
32
36
33
37
`ln -s cacert.pem 6d2962a8.0`
34
38
35
-
3. Copy the private key (for example, syslog-ng.key) matching the
36
-
certificate of the {{ site.product.short_name }} server to the {{ site.product.short_name }} server host,
37
-
for example, into the /opt/syslog-ng/etc/syslog-ng/key.d directory.
38
-
The key must be in PEM format. If you want to use a
39
-
password-protected key, see Password-protected keys.
40
-
41
39
4. Add a source statement to the {{ site.product.short_name }} configuration file that uses
42
40
the tls( key-file(key_file_fullpathname)
43
41
cert-file(cert_file_fullpathname) ) option and specify the key and
44
42
certificate files. The source must use the source driver (network()
45
-
or syslog()) matching the destination driver used by the syslog-ng
43
+
or syslog()) matching the destination driver used by the {{ site.product.short_name }}
46
44
client. Also specify the directory storing the certificate of the CA
47
45
that issued the client's certificate.
48
46
@@ -52,7 +50,7 @@ Complete the following steps on the {{ site.product.short_name }} server:
52
50
Example: A source statement using TLS
53
51
54
52
The following source receives log messages encrypted using TLS,
55
-
arriving to the 1999/TCP port of any interface of the syslog-ng
53
+
arriving to the 1999/TCP port of any interface of the {{ site.product.short_name }}
0 commit comments