Use this documentation with care! It describes the outdated version 7, which was actively developed around 2014 and is considered dead by the rsyslog team.

This documentation reflects the latest update of the v7-stable branch. It describes the 7.6.8 version, which was never released. As such, it contains some content that does not apply to any released version.

To obtain the doc that properly matches your installed v7 version, obtain the doc set from your distro. Each version of rsyslog contained the version that exactly matches it.

As general advise, it is strongly suggested to upgrade to the current version supported by the rsyslog project. The current version can always be found on the right-hand side info box on the rsyslog web site.

Note that there is only limited rsyslog community support available for the outdated v7 version (officially we do not support it at all, but we usually are able to answer simple questions). If you need to stick with v7, it probably is best to ask your distribution for support.

Sample Use Case: Single Central Log Server

We have a quite simple use case. There is one central syslog server, named These server is being reported to by two Linux machines with name and Also, there is a third client - - which send both its own messages to the central server but also forwards messages receive from an UDP-only capable router. We hav decided to use because it is in the same local network segment as the router and so we enjoy TLS’ security benefits for forwarding the router messages inside the corporate network. All systems (except the router) use rsyslog as the syslog software.

Please note that the CA must not necessarily be connected to the rest of the network. Actually, it may be considered a security plus if it is not. If the CA is reachable via the regular network, it should be sufficiently secured (firewal rules et al). Keep in mind that if the CA’s security is breached, your overall system security is breached.

In case the CA is compromised, you need to regenerate the CA’s certificate as well as all individual machines certificates.

Previous topic

Encrypting Syslog Traffic with TLS (SSL)

Next topic

Setting up the CA

This Page