Infoblox Deployment Guide Slog and SNMP Configuration For Nios
Infoblox Deployment Guide Slog and SNMP Configuration For Nios
Introduction 3
Syslog 3
Configuration 3
Syslog Categories 5
Configuring SNMP 8
MIB 10
Sending notifications 12
Notifications 14
Monitoring configuration 15
DNS 15
Splunk alerts 21
Create an alert 21
Additional Documentation 24
Annex 24
Syslog
This section covers how to configure Infoblox syslog settings.
Configuration
Syslog configuration can be done Grid wide and/or customized at the Grid member level. When
you edit the Syslog settings at the member level, you have the option to inherit the Syslog grid
wide settings or override those grid wide settings
Once enabled, complete the steps for adding information of your external syslog server:
Click the + icon of the External Syslog Servers table and enter the following information in
the new row:
— Address: The IPv4 or IPv6 address of the syslog server.
— Transport: The protocol supported by your syslog server. Secure TCP is the default
— Interface: Select the interface to be used for the connection to the syslog server.
• ny: The appliance chooses any port that is available for sending syslog messages.
A
The server will use its routing table, including any static routes you have added, to
determine the interface to be used.
— ode ID: Specify the host or node identification string used to identify the appliance
N
from which syslog messages are originated. This string appears in the header message
of the syslog packet.
— Source: From the drop-down list, select Any to send messages
— Severity: Choose a severity filter from the drop-down list. When you choose a severity
level, Grid members send messages for that severity level plus all messages for all
severity levels above it.
— Copy Audit Log Messages to Syslog: Select this for the Grid member to include
audit log messages among the messages it sends to the syslog server. For many security
compliance audits this setting needs to be enabled.
Logging Categories
The following categories are available to select from when forwarding Syslog Messages:
● Threat Protection
○ These are the ADP events as well as ruleset update events
● Active Directory Authentication
○ Events based on authentication against Microsoft Active Directory
● Common Authentication
○ Authentication against all configured forms
● LDAP Authentication
○ Authentication against LDAP systems
● Non-system Authentication
○ Any non-local authentication events
● RADIUS Authentication
○ Authentication against RADIUS systems
● TACACS Authentication
○ Authentication against TACACS systems
● UI API Authentication
○ Any form of authentication tied to API logins
● Cloud API
○ Cloud API events including discovery, synchronization and automation events
● DHCP Process
○ Events based on the DHCP process status
● DNS Client
○ Events based on client DNS behavior
After selecting logging categories above, click on TEST button to test connectivity to the
syslog server and/or click on the ADD button to add the external syslog server entry.
On this system the following steps are taken to allow us to accept logging:
● Modify rsyslog.conf to accept external connections
● Setup syslog rolling once the file size reaches 150MB
Before you forward to your external server you only see localhost entries:
Configuring SNMP
SNMP configuration can be done at the Grid and/or member level. You have the options to
inherit the grid wide settings or override Grid settings at a member level.
SNMP System Information: You can enter values for the following managed objects in MIB-II,
the standard MIB defined in RFC 1213. Management systems that are allowed to send queries
to the appliance can query these values..
• sysContact: Enter the name of the contact person for the appliance.
• sysLocation: Enter the physical location of the appliance.
• sysName: Enter the fully qualified domain name of the appliance.
• sysDescr: Enter useful information about the appliance, such as the software version
it is running.
MIB
You can obtain the Infoblox SNMP MIB details by clicking the Downloads button under
Toolbar.
Configure the community strings of the Ubuntu host to match the Infoblox grid member so one
can query it.
If you want to get a look at all available data from the grid member through SNMP you can also
use snmpwalk. Please note that if you have a large dataset of zones and networks this can be a
lot of data.
“
snmpwalk -v 2c -c public $memberIP
”
You should see a full snmpwalk output which gives you all the data that can be queried by
SNMP..
After you configured SNMP traps on the appliance, you can click Test SNMP from the Toolbar
to test your SNMP configuration. The appliance sends a “test trap” string to the trap receiver. In
our example it will arrive to Ubuntu VM as shown below.
You also have the ability to trigger specific traps from the servers CLI. While logged in to the CLI
of the grid member, enter maintenance mode by entering the command:
set maintenancemode
Sending notifications
4. Check "Enable Email Notification" and enter the “TO” email address.
a. If required, enable the Use SMTP Relay and enter the name or IP address of the
relay server to be used.
5. Click to the "Test email settings" to send a test email message.
6. Verify that the test email was received. The sender will be no-reply@<servername>,
where <servername> is the name configured for your Infoblox server.
Enter the email server and any authentication details for it. Fill out the link hostname field with
your Grid Master’s hostname or IP.
A minimal mail server installation guide can be found in the annex section.
Notifications
The settings under this tab determine which notifications are also sent as an SNMP trap and
which are sent as an email notification.
DNS
DNS Service
Description
Implementation
DNS event type must be enabled as a notification category in the Grid properties or on a
member level.
Description
Detect if a DNS health check failed has been raised in the syslog messages.
It indicates that the DNS resolution is out of order despite the DNS service running.
Implementation
Note: DNS event type must be enabled as a notification category in the Grid properties or in the
member level.
Description
Detect whether a public domain resolution is working or not. This is only relevant for DNS
members which have a recursive/forwarding role for public domain. (your caching resolvers.)
Implementation
Note: DNS event type must be enabled as a notification category in the Grid properties or on the
member level
Description
Check whether the authority servers declaration for a public zone are the same from DNS
Internet NS and Infoblox database. If not, this could indicate the domain is being a hijacked or
simply not renewed in time. This is only relevant for DNS members which hosts your public
zones.
Implementation
DNS Integrity Check must be enabled for all public zones you want to monitor.
1. Navigate to Data management > DNS > Zones
2. Select the desired DNS view if applicable.
“DNS Integrity Check / Connection” event type must be enabled as a notification category in
the Grid properties or in the member level.
Description
Detect if a zone transfer from an external DNS primary server has failed.
This is really useful to avoid discrepancies between the DNS master of a zone and the DNS
slave servers.
Remember also that after the expiration time is reached, the DNS slave server will not respond
to the queries for the secondary zone anymore.
Implementation
This alert requires the reporting member or an external syslog server (like Splunk).
Syslog data must be sent from the Infoblox DNS members to the reporting server. In order to do
In reporting, this alert can be scheduled to run at any interval. However, the setting for this
interval depends on the expiration time of your zones. You should alert before the expiration
time and allow for some time to address the issue.
The following search command will provide you with the failed zone transfer events:
index=ib_syslog err transfer of failed
Description
Detect whether a private IP address is configured in a DNS response. This must be resolved by
creating all the IPv4 private reverse-mapping zone (cf RFC 1918)
Implementation
This alert requires the reporting member or an external syslog server (like Splunk).
Syslog data must be sent from the Infoblox members to the reporting server. In order to do so
enable the Syslog category under the reporting index settings.
Description
Measure the DNS response time for a resource record that is already in the cache. This is
typically around 1ms and should not be more than 5-10ms. If it is longer than 10ms it could be
a component in your network that is introducing extra latency or there is a routing problem.
This is relevant for all members which operate as caching DNS servers and have to retrieve a
record from another DNS server (forward and stub zones, delegations).
Implementation
Description
Measure the DNS response time for a resource record not in the cache. This is relevant for all
members and in particular caching DNS servers which have to retrieve a record to another DNS
server (forward and stub zones, delegations).
Implementation
Note that you have to define an existing resource record for your test and set the cache timers
Lower than your test schedule frequency to ensure you monitor a DNS response time for an
uncached entry.
DTC Monitor
Description
Check whether a health monitor check to a server has failed (http(s), icmp, tcp...).
Implementation
This alert requires the reporting member or an external syslog server (like Splunk).
Syslog data must be sent from the Infoblox members to the Reporting member. In order to do
so enable the Syslog category under the reporting index settings.
DTC health monitors logging must be enabled as a DNS logging category
Create an alert
How to create an alert from Splunk and send it by mail. This is not a complete overview of all
Splunk capabilities. Please visit the Splunk website for more detailed product documentation.
A Splunk alert is typically based on a "keyword" search. The first step is to know what the log
content will be.
We will configure an alert example for a failed transfer zone from an external master DNS
server.
If we search the log, we can see a log message like:
“transfer of 'zt.intra/IN' from 192.168.1.60#53: failed to connect:
connection refused”
OR
“transfer of 'fresh-domain.surbl.rpz.infoblox.local/IN' from
54.69.93.185#53: failed while receiving responses: REFUSED"”
We have to observe what will be the common word when there are some issues with a zone
transfer and be sure that both alerts will be caught. Here the keywords should be " transfer of"
and "failed"
Once we've identified the keywords to catch the relevant log entry, we have to create the alert:
Go to Reporting > Search and enter the keywords “transfer of” and “failed”
Specify the index category to improve the search performance with the search below:
Once you have created your search and validate the match, you have to save it as an alert.
Additional Documentation
● NIOS Admin Guide
o Chapter 37 “Monitoring the Appliance”
Monitoring Services
Using a Syslog Server
Monitoring Tools
o Chapter 39 Monitoring with SNMP
● NIOS CLI Guide
● DNS Log Message Reference
● DHCP Log Message Reference
Annex
These are quick steps to install for a full mail server with Postfix and Dovecot on an Ubuntu
Linux distribution.
In the same file, add the domain for your mailbox to the conf line "mydestination"
To add a mailbox, just add a user with the name for which you want an email address:
adduser user
Test if the mailbox receives the mail for your mail address
“sudo apt-get install mailutils”
If you go to "/homer/username/Maildir/new, you should see the file which is the mail you just
sent.
Install Dovecot to retrieve the mails with your client mail: "apt-get install
dovecot-pop3d"to use POP mail protocol or "dovecot-imapd"to use IMAP mail protocol.
YourServerName A @IP