Create a Storage Only Log Source
Topics Discussed
To obtain Log Relay and to configure your account for remote log collection, you must have the following AMP permissions added to your account:
Write Virtual Machine
Delete Log Management
Read Log Endpoints
Read Log Relays
Write Log Relays
Delete Log Relays
You can use this document to send compliance logs to Armor's Data Lake.
Pre-Deployment Considerations
To create a remote Log Relay, you must already have:
A Log Relay server on your account
To learn how to add Log Relay to your account, see Obtain Log Relay for Remote Log Collection
Configured the system clock
Configure Your Device or Application
Configure the remote log source's logs to be sent to a designated Armor Log Relay device
Configure the remote log source to forward syslogs to the IP address of the corresponding Armor Log Relay device.
To locate your IP address in AMP, in the left-side navigation, click Infrastructure, click Virtual Machines, and then review the Primary IP column for the corresponding virtual machine.
Configure the remote log source to forward syslogs to the appropriate protocol/port of the corresponding Armor Log Relay device.
For UDP, enter udp/5140
For TCP, enter tcp/5141
If required, configure logs to be sent to a designated Armor Log Relay device over SSL/TLS:
SSL/TLS Secured Communications
In most cases, we assume network isolation using subneting and/or firewalls are in place to secure communication between a log source and your Log Relay. There are a few exceptions to this assumption:
In scenarios where it is typical to have data traverse the Internet, or in scenarios where a device only supports TLS-secured transport, the Log Relay config supports TLS ingestion.
For Steps to enable SSL; see expansion below: