By the way, as the original author of omudpspoof, I want to try and discourage anyone from using it if they have any other way of making things work.

It is a very ugly hack, and it's performance is always going to be poor due to the overhead of changing the source IP address for the forgery.

If there is any way of having the thing that's recieving the logs look at the server name or IP address in the message instead of having it look at the source IP in the syslog packet, you should do so.

And if you are using some proprietary tool that is broken like this, you should complain loudly that this tool is broken if you have syslog relay servers, something that has been part of the syslog spec for decades.

I wrote this module because at $work we had exactly such a system, and after spending >$500K on it and two years, we ended up scrapping it because Simple Event Correlator was faster on given hardware, more powerful, and simpler to maintain (not to mention being _far_ cheaper as it's Open Source), even in very high volume environments.

If you don't trust the sending systems to set the hostname properly, have your first relay system replace the server name with the fromhost-IP of the box that sent the message.

If you still need to run omudpspoof, you have my sympathies.

David Lang
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to