Syslog/TLS forwarding
Use this path when you already have rsyslog or similar syslog-based infrastructure and want to forward into logging24 without switching to the native Linux binary or the
l24
CLI.
When to use this
- You already operate centralized syslog forwarding.
- You need infrastructure-level forwarding from appliances or existing rsyslog estates.
- You want to keep syslog/TLS as the transport layer.
Overview
The syslog receiver expects a stable external identifier inside the forwarded message format. That identifier is then associated with a logging24 write-token configuration in the web UI.
1. Generate an identifier
Generate a unique identifier in the expected
d.xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
shape:
od -vAn -N16 -tx1 < /dev/urandom | \
awk '{ gsub (" ", "", $0); print }' | \
cut -c 1-8,9-13,14-17,18-21,22-33 --output-delimiter "-" | \
awk '$0="d."$0'
2. Create the matching write token
- Create a write token in the logging24 web UI.
- Select the external-ID mode used for syslog-style forwarding.
- Enter the generated identifier as the external identifier.
- Set prefixes for later search scoping.
3. Configure rsyslog
Create a dedicated rsyslog config such as
/etc/rsyslog.d/99-l24.conf
:
template(name="l24Stream0" type="string"
string="<%PRI%>1 %TIMESTAMP:::date-rfc3339% d.xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx %APP-NAME% %PROCID% %MSGID% - %msg%\n")
*.* action(
type="omfwd"
protocol="tcp"
tcp_framing="octet-counted"
StreamDriver="gtls"
StreamDriverMode="1"
StreamAuthMode="anon"
target="ingest.logging24.com"
port="9100"
template="l24Stream0"
)
Replace the sample identifier with the one you generated.
4. Restart rsyslog
systemctl restart rsyslogd
Config details
tcp_framing="octet-counted"
|
Use octet-counted framing rather than legacy line-based syslog framing. |
StreamDriver="gtls"
|
Enables TLS transport. |
StreamDriverMode="1"
|
Puts rsyslog into TLS client mode for this action. |
StreamAuthMode="anon"
|
Uses anonymous TLS auth in this receiver model. |
Troubleshooting
- Verify the generated identifier exactly matches the external identifier configured in logging24.
-
Check rsyslog status with
systemctl status rsyslogorsystemctl status rsyslogd, depending on your distribution. -
Inspect rsyslog logs with
journalctl -u rsyslog -f. -
Check network reachability to
ingest.logging24.com:9100.