...
Log Type | Ingestion label | Preferred Logging Protocol -Format | Log collection method |
---|---|---|---|
Hashicorp Vault | HASHICORP | SYSLOG+JSON | CyberHub |
Port Requirements
Source | Destination | Port |
---|---|---|
HashiCorp Vault | CyberHub | 601 10014 (Secure TCP) |
To facilitate secure communication and align with our best practice, we strongly encourage the use of Transport Layer Security (TLS) between your security devices and our Adaptive MxDR platform for event forwarding.
While we understand that TLS support may not be available on all devices, if your devices do support TLS communication, we recommend utilizing port 10014 for seamless integration.
In some cases, the upgraded version of the device might incorporate TLS support without prior notice. If you come across such a scenario or for further assistance in configuring TLS, we kindly ask you to reach out to your dedicated Adaptive MxDR Service Delivery Lead.
Device Configuration
Log in to the HashiCorp Vault CLI
...
To configure NxLog Agent for TLS TCP Log flow on port 10014:
Download and Install NxLog agent from Download
For TLS, need to create certificate file for communication. On CyberHub , navigate to support user mode and choose option 11 to View Certificate to export for FTPS and TCP.
Copy and paste the certificate to new file and save this file into squid server at desired location.
For Linux Agent, after installation go to installed location “/etc/nxlog.conf”. Rename attached NXLog.conf(TLS) to
nxlog.conf
and copy into this folder.Replace “lcpIp” with “CyberHub IP Address” in
nxlog.conf
Change
vault_audit.log
file location on line 24Add CA File location at position 37
Now start the nxlog service using below command
...
Property | Default Value | Description |
---|---|---|
IP Address | HashiCorp Vault interface IP address | Hostname or IP address of the device which forwards logs to the CyberHub |