You can add an action to forward the received message to another syslog host using the specified syslog protocol.
From the Action menu, select Forward to another host.
Specify the remote host IP address or host name. To send messages to multiple hosts, separate each host name or IP address with a comma. For example:
Myhost.com, SecondHost.net, 18.104.22.168, ABC:567:0:0:8888:9999:1111:0
Specify the protocol.
The Kiwi Reliable Delivery Protocol (KRDP) works between two Kiwi Syslog Servers to reliably deliver syslog messages over a TCP transport.
Specify any of the following optional values.
|New Facility||Forces outgoing messages to use a different facility. In most cases, accept the default value of - No change -.|
|New Level||Forces outgoing messages to use a different level. In most cases, accept the default value of - No change -.|
|KRDP connection identifier|| |
Specifies the unique name assigned to the KRDP connection. Each connection between the source and destination syslog Server needs to be identified. When the connection is broken and re-established, the sequence numbers can be exchanged and any lost messages can be resent. A separate set of message sequence numbers are kept against each connection identifier.
Examples are: Source:RemoteOffice1 or SyslogServer1
The string of text used will uniquely identify the source of the connection to the destination syslog Server.
If you have more than one "Forward to another host" action configured, you can use the same connection identifier on all actions. This will mean that only a single KRDP connection is made between the source and destination syslog Servers. If you specify a different connection identifier, multiple KRDP sessions will be created.
To ensure that the identifier is unique, we recommend the use of the %MACAddress variable. This variable will be replaced by the first MAC address of the machine.
Examples are: Source:RemoteOffice1-%MACAddress
When running, the ID would look like: Source:RemoteOffice1-AA-BB-CC-DD-EE-FF-00 The MAC Address is globally unique to each network card.
|Send with RFC3164 header information|| |
Adds the standard RFC3164 header information to the outgoing message. The format is:
<priority>Date Hostname PID Message text</priority>
The Priority is a value between 0 and 191.
The Date is in the format of Mmm DD HH:NN:SS (July 4 12:44:39). Note there is no year specified. The PID is a program identifier up to 32 characters in length.
|Retain the original source address of the message|| |
Normally, the syslog protocol is unable to maintain the original sender's address when forwarding syslog messages. This is because the sender's address is taken from the received UDP or TCP packet.
Kiwi Syslog solves this problem by placing a tag in the message text that contains the original sender's address. By default, the tag looks like Original Address=192.168.1.1. That is, the "Original Address=" tag, followed by the IP address, followed by a " " (space) delimiter or tag.
These tags are inserted only if the "Retain the original source address of the message" option is selected.
If the "Spoof Network Packet" option is used, then the "Original Address=" tag will not be used. The Syslog packet will be forwarded to the destination address as though it has been sent from the originating IP address.
|Use a fixed source IP address|| |
Uses a fixed IP address in the Original Address= tag. This can be useful when you want to identify all outgoing messages as from a particular host. For example, if you have many remote syslog Servers sending messages to one central location. If each of the remote syslogs use the 10.0.0.x address range, all the received messages will appear from the same host. Specifying a different source IP address for each remote syslog could help in identifying the incoming messages better.
If the "Spoof Network Packet" option is used, then the "Original Address=" tag will not be used. The Syslog packet will be forwarded to the destination address as though it has been sent from the specified fixed IP address.
|Spoof Network Packet|| |
This option only applies to syslog messages forwarded via UDP protocol with IPv4 address only.
The network packet is spoofed to appear as though the forwarded message has come directly from the originating devices' IP address, and not the address of the Syslog Server. Kiwi Syslog Server will use the Selected Network Adapter to send the spoofed UDP/IP packet.
This feature is only available in the licensed version. It requires WinPcap 4.1+ installation.