GSSAPI module support in rsyslog v3¶
What is it good for.
- client-serverauthentication 
- Log messages encryption 
Requirements.
- Kerberos infrastructure 
- rsyslog, rsyslog-gssapi 
Configuration.
Let’s assume there are 3 machines in Kerberos Realm:
- the first is running KDC (Kerberos Authentication Service and Key Distribution Center), 
- the second is a client sending its logs to the server, 
- the third is receiver, gathering all logs. 
- KDC: 
- Kerberos database must be properly set-up on KDC machine first. Use kadmin/kadmin.local to do that. Two principals need to be add in our case: 
- client must have ticket for principal sender 
- REALM.ORG is kerberos Realm 
- host/receiver.mydomain.com@REALM.ORG - service principal 
- Use ktadd to export service principal and transfer it to /etc/krb5.keytab on receiver 
- CLIENT: 
- set-up rsyslog, in /etc/rsyslog.conf 
- $ModLoad omgssapi - load output gss module 
- $GSSForwardServiceName otherThanHost - set the name of service principal, “host” is the default one 
- *.* :omgssapi:receiver.mydomain.com - action line, forward logs to receiver 
- kinit root - get the TGT ticket 
- service rsyslog start 
- SERVER: 
- set-up rsyslog, in /etc/rsyslog.conf 
- $ModLoad imgssapi - load input gss module 
- $InputGSSServerServiceName otherThanHost - set the name of service principal, “host” is the default one 
- $InputGSSServerPermitPlainTCP on - accept GSS and TCP connections (not authenticated senders), off by default 
- $InputGSSServerRun 514 - run server on port 
- service rsyslog start 
The picture demonstrate how things work.
 
rsyslog gssapi support¶
Support: rsyslog Assistant | GitHub Discussions | GitHub Issues: rsyslog source project
Contributing: Source & docs: rsyslog source project
© 2008–2025 Rainer Gerhards and others. Licensed under the Apache License 2.0.