Services
The Services page of the Signum Admin Web Console gives the administrator the option for configuring external logging services for the Signum Event Logs. The supported logging services are Syslog and Splunk.
SysLog
Setting | Description |
|---|---|
SysLog | Enable to activate SysLog exports. |
Protocol | The Communication protocol to use TCP or UDP. |
Server | The SysLog Server URL. |
Port | Optional Port configuration. |
TLS | Enable to use TLS. |
TLS Certificate | The TLS certificate of the SysLog server |
Splunk - HTTP Event Collector
This setting configures Signum to send Event Log data to a configured Splunk server using their Event Collector framework.
For information on setting up the HTTP Event Collector, see the Splunk documentation.
The Signum Server must be running version 4.20 or later before enabling this feature.
Setting | Description |
|---|---|
Splunk logs enabled | Enable to activate sending the logs to Splunk. |
Validate service connection certificate enabled | Choose whether Signum must validate the Splunk server certificate. If your Splunk server is using a private CA certificate, contact Keyfactor Support to add the certificate to Signum. |
Splunk HEC URL | The URL of your Splunk HTTP Event Collector. To make sure the URL is configured properly, see the Splunk documentation. The An example of a URL from a trial Splunk instance may look like:
CODE
|
Splunk HEC Token | The HEC Access token from Splunk. |