Page tree
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 53 Next »

This topic only applies to Armor Anywhere users.

Overview

You can use the Log Collector feature to convert your virtual machines into a log collecting device, which will forward logs to the Armor Management Portal (AMP). Within AMP, Armor will securely store, review, and analyze supported log types. 


Add Log Collector

Step 1: Review requirements

Support DevicesYou can only convert Linux machines that are in an OK state.
Pricing information

While log collection is available to all Armor Complete users, there is a cost associated with sending and storing logs.

For pricing information, please contact your Account Manager. 

Permissions

You must have the Write Virtual Machine permission included in your account in order to use Log Collector. 

To learn more about permissions, see Roles and Permissions (Armor Complete).



Step 2: Convert your virtual machine

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines
  3. Locate and hover over the desired virtual machine. 
  4. Click the vertical ellipses. 
  5. Click Convert to Log Collector
  6. Review the product information, and then click Confirm

Step 3 Create a firewall rule for ingress

  1. n the Armor Management Portal (AMP), in the left-side navigation, click Security
  2. Click Firewall.
  3. Click Service Groups
  4. Click the plus ( + ) icon. 
  5. In Service Group Name, enter a descriptive name, such as Log Collector (ingress)
  6. In Add Members to Group, enter: 
    • tcp/5141
    • udp/5140
  7. Click Apply
  8. In the Armor Management Portal (AMP), in the left-side navigation, click Security
  9. Click Firewall
  10. Click Rules
  11. Click the plus ( + ) icon. 
  12. In Name, enter a descriptive name, such as Log Collector (ingress).
  13. In Action, select Allow
  14. In Source, enter the IP address of the application server that will send the logs. 
  15. In Destination, enter the IP address of the log collecting virtual machine. 
  16. Click Save Rule

Step 4: Create a firewall rule for egress

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Security
  2. Click Firewall.
  3. Click Service Groups
  4. Click the plus ( + ) icon. 
  5. In Service Group Name, enter a descriptive name, such as Log Collector (egress)
  6. In Add Members to Group, enter tpc/5443
  7. Click Apply
  8. In the Armor Management Portal (AMP), in the left-side navigation, click Security
  9. Click Firewall
  10. Click Rules
  11. Click the plus ( + ) icon. 
  12. In Name, enter a descriptive name, such as Log Collector (egress).
  13. In Action, select Allow
  14. In Source, enter the IP address of the log collector. 
  15. In Destination, enter 1c.log.armor.com.
  16. In Services, select the service group you created earlier (Log Collector (egress)). 
  17. Click Save Rule

Step 5: Validate log collection in AMP

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Security
  2. Click Log Management
  3. Click Sources
  4. Search for the application server that is sending logs. 
  5. Click Search
  6. Search for a log message from the application server. 

Remove Log Collector

If you remove the log collector feature from a virtual machine, Armor will still retain the collected logs. 

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure
  2. Click Virtual Machines
  3. Locate and hover over the desired virtual machine. 
  4. Click the vertical ellipses. 
  5. Click Remove Log Collector

Troubleshoot Log Collector 

If you do not see any data in the Log Collector screen, consider that:

  • Your instance is powered off.
    • To review the status of your instance, in the left-side navigation, click Infrastructure, and then click Virtual Machines
    • For more information, see Virtual Machines (Armor Complete)
  • You do not have permission to view and configure this screen.
    • You must have the Write Virtual Machine permission enabled. Contact your account administrator to enable these permissions. To learn how to update you permissions, see Roles and Permissions (Armor Complete).


  • No labels