rsyslog module reference

UDP spoofing output module (omudpspoof)

Module Name:    omstdout

Authors: Rainer Gerhards <rgerhards@adiscon.com> and David Lang <david@lang.hm>

Available Since: 5.1.3 / v7 config since 7.2.5

Description:

This module is similar to the regular UDP forwarder, but permits to spoof the sender address. Also, it enables to circle through a number of source ports.

Important: This module requires root priveleges for its low-level socket access. As such, the module will not work if rsyslog is configured to drop privileges.

load() Parameters:

 

action() parameters:

pre-v7 Configuration Directives:

Caveats/Known Bugs:

Config Samples

The following sample forwards all syslog messages in standard form to the remote server server.example.com. The original sender's address is used. We do not care about the source port. This example is considered the typical use case for omudpspoof.

The following sample forwards all syslog messages in unmodified form to the remote server server.example.com. The sender address 192.0.2.1 with fixed source port 514 is used.

The following sample is exatly like the previous, but it specifies a larger size MTU. If, for example, the envrionment supports Jumbo Ethernet frames, increasing the MTU is useful as it reduces packet fragmentation, which most often is the source of problems. Note that setting the MTU to a value larger than the local-attached network supports will lead to send errors and loss of message. So use with care!

Of course, the action can be combined with any type of filter, for example a tradition PRI filter:

... or any complex expression-based filter:

and of course it can also be combined with as many other actions as one likes:

Legacy Sample (pre-v7):

The following sample forwards all syslog messages in standard form to the remote server server.example.com. The original sender's address is used. We do not care about the source port. This example is considered the typical use case for omudpspoof.

The following sample forwards all syslog messages in unmodified form to the remote server server.example.com. The sender address 192.0.2.1 with fixed source port 514 is used.

The following sample is similar to the previous, but uses as many defaults as possible. In that sample, a source port in the range 32000..42000 is used. The message is formatted according to rsyslog's canned default forwarding format. Note that if any parameters have been changed, the previously set defaults will be used!

[rsyslog.conf overview] [manual index] [rsyslog site]

This documentation is part of the rsyslog project.
Copyright © 2009-2012 by Rainer Gerhards and Adiscon. Released under the GNU GPL version 3 or higher.