Information
rsyslog supports the ability to send log events it gathers to a remote log host or to receive messages from remote hosts, thus enabling centralized log management.
Storing log data on a remote host protects log integrity from local attacks. If an attacker gains root access on the local system, they could tamper with or remove log data that is stored on the local system.
Note: This recommendation only applies if rsyslog is the chosen method for client side logging. Do not apply this recommendation if systemd-journald is used.
Solution
Edit the /etc/rsyslog.d/remote.conf. file and add the following line (where loghost.example.com is the name of your central log host). The target directive may either be a fully qualified domain name or an IP address.
TCP Example:
*.* action(type="omfwd" target="loghost.example.com" port="514" protocol="tcp"
action.resumeRetryCount="100"
queue.type="LinkedList" queue.size="1000")
Run the following command to reload rsyslog.service :
# systemctl reload-or-restart rsyslog.service
Open the respective port in the firewall. For firewalld with TCP on port 514 run:
# firewall-cmd --add-port 514/tcp --permanent
# firewall-cmd --reload