We need the spoofing because rsyslog adds a timestamp and an IP (127.0.0.1) to the beginning of each message forwarded and it messes up the legacy parsing.
Does @@remotesystem perform compression and will it spool messages by default in case the link goes down? RB -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of David Lang Sent: Wednesday, September 30, 2015 6:14 PM To: rsyslog-users <[email protected]> Subject: Re: [rsyslog] Complex forwarding and spoofing question On Thu, 1 Oct 2015, Randy Baca wrote: > I have a complex issue to resolve and I would like to use rsyslog for it. > Hopefully someone has done this. > > > > Currently we have a number of remote sites and each site has a single syslog > server collecting events from multiple hosts. We need to keep the flow going > to the legacy syslog servers and also forward all events to a central server > at one of the sites. The legacy syslog servers need to stay running until > several other projects get completed; maybe a year. > > > > This is what we want to do. We have pieces of it working but can't get > everything at once. > > * Set up rsyslog on the same server that is running the legacy service. > * Change the legacy service to run on udp/515. > * Configure rsyslog to receive on existing ports udp/tcp 514. We are > essentially injecting it between the sending hosts and the legacy service. > * Configure rsyslog to forward and spoof (omudpspoof) to 127.0.0.1 on > udp/515. We need the exact original message because of all the custom > parsers written over the years. > * Add another action to forward all messages to the central location. > Some sites are not high bandwidth, so we will need compression, TCP for > reliability, and spooling in case the link goes down or one of the endpoints > reboots. > * The server at the central location will itself then forward to multiple > services locally. > > Is this do-able? Can someone get me started with an example config? it's doable, but you shouldn't need to do the spoofing. Spoofing is only needed if the receiving system ignores the text of the log message and instead uses the IP address in the packet. It's as simple as two outputs @localhost:515 @remotesystem or @@remotesystem if you want to use TCP forwarding David Lang _______________________________________________ rsyslog mailing list http://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT. _______________________________________________ rsyslog mailing list http://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.

