Task: 
Enable Syslog monitoring/auditing for TKGI cluster. 
 
 
Logging Types Available: 
- Syslog 
- Telegraph (metrics) 
- Healthwatch 
- VMware vRealize Log Insight (vRLI) (vSphere only) 
 
Notes: 
- Syslogs sends log messages for all BOSH-deployed VMs in the TKGI cluster. 
- Includes Kubernetes cluster audit logs 
- Syslogs might include cloud provider credentials or other sensitive information. TLS set-up is highly recommended. 
- Including the CA TLS Certificate is not required if the CA cert is in the BOSH VM's certificate store. 
- For RSyslog information on RainerScript, see examples at: github.com/cloudfoundry/syslog-release/blob/main/examples/ 
- - Using RainerScript in the BOSH manifest, requires using either single quotes, or the yaml "pipe" (|) syntax for multi-line strings, as double quotes generally lead to invalid yaml. 
 
Example to not include DEBUG level logging: 
if ($msg contains 'DEBUG') then stop 
 
 
Enable Remote Syslog Monitoring: 
Tanzu Kubernetes Grid Integrated Edition (tile) --> Host Monitoring 
- Under Enable Syslog for TKGI, select Yes 
- Under Address: <enter the syslog target endpoint> 
- Under Port: <enter the syslog target endpoint> 
- Under Transport Protocol: <select transport protocol for log forwarding> 
- TLS: Enable TLS (selected) 
- - Under Permitted Peer: <provide the accepted fingerprint (SHA1), or the name of the target endpoint/peer> (e.g. *.syslog.mindwatering.net) 
- - Under TLS Certificate: <add_cert for endpoint> 
- (Optional) Under Max Message Size:  25000 (default: 10,000 characters) 
- (Optional) Under Custom Rsyslog Configuration: <enter custom Rsyslog RainerScript> 
- Click Save (button) 
  
previous page
 
  |