diff --git a/src/Core/Core.csproj b/src/Core/Core.csproj
index f4ff4a3d09..f789811ca5 100644
--- a/src/Core/Core.csproj
+++ b/src/Core/Core.csproj
@@ -49,6 +49,7 @@
+
diff --git a/src/Core/GlobalSettings.cs b/src/Core/GlobalSettings.cs
index 7a216bfe7f..2293e468dd 100644
--- a/src/Core/GlobalSettings.cs
+++ b/src/Core/GlobalSettings.cs
@@ -32,6 +32,7 @@ namespace Bit.Core
public virtual DataProtectionSettings DataProtection { get; set; } = new DataProtectionSettings();
public virtual DocumentDbSettings DocumentDb { get; set; } = new DocumentDbSettings();
public virtual SentrySettings Sentry { get; set; } = new SentrySettings();
+ public virtual SyslogSettings Syslog { get; set; } = new SyslogSettings();
public virtual NotificationHubSettings NotificationHub { get; set; } = new NotificationHubSettings();
public virtual YubicoSettings Yubico { get; set; } = new YubicoSettings();
public virtual DuoSettings Duo { get; set; } = new DuoSettings();
@@ -159,6 +160,49 @@ namespace Bit.Core
public string RedisConnectionString { get; set; }
}
+ public class SyslogSettings
+ {
+ ///
+ /// The connection string used to connect to a remote syslog server over TCP or UDP, or to connect locally.
+ ///
+ ///
+ /// The connection string will be parsed using to extract the protocol, host name and port number.
+ ///
+ ///
+ /// Supported protocols are:
+ ///
+ /// - UDP (use
udp://
)
+ /// - TCP (use
tcp://
)
+ /// - TLS over TCP (use
tls://
)
+ ///
+ ///
+ ///
+ ///
+ /// A remote server (logging.dev.example.com) is listening on UDP (port 514):
+ ///
+ /// udp://logging.dev.example.com:514
.
+ ///
+ public string Destination { get; set; }
+ ///
+ /// The absolute path to a Certificate (DER or Base64 encoded with private key).
+ ///
+ ///
+ /// The certificate path and are passed into the .
+ /// The file format of the certificate may be binary encded (DER) or base64. If the private key is encrypted, provide the password in ,
+ ///
+ public string CertificatePath { get; set; }
+ ///
+ /// The password for the encrypted private key in the certificate supplied in .
+ ///
+ ///
+ public string CertificatePassword { get; set; }
+ ///
+ /// The thumbprint of the certificate in the X.509 certificate store for personal certificates for the user account running Bitwarden.
+ ///
+ ///
+ public string CertificateThumbprint { get; set; }
+ }
+
public class NotificationHubSettings
{
private string _connectionString;
diff --git a/src/Core/Utilities/LoggerFactoryExtensions.cs b/src/Core/Utilities/LoggerFactoryExtensions.cs
index 9ec3229dfa..2d685dfd39 100644
--- a/src/Core/Utilities/LoggerFactoryExtensions.cs
+++ b/src/Core/Utilities/LoggerFactoryExtensions.cs
@@ -5,7 +5,10 @@ using Microsoft.Extensions.Hosting;
using Microsoft.Extensions.Logging;
using Serilog;
using Serilog.Events;
+using Serilog.Sinks.Syslog;
using System;
+using System.Security.Authentication;
+using System.Security.Cryptography.X509Certificates;
namespace Bit.Core.Utilities
{
@@ -70,6 +73,52 @@ namespace Bit.Core.Utilities
.Enrich.FromLogContext()
.Enrich.WithProperty("Project", globalSettings.ProjectName);
}
+ else if (CoreHelpers.SettingHasValue(globalSettings?.Syslog.Destination))
+ {
+ // appending sitename to project name to allow eaiser identification in syslog.
+ var appName = $"{globalSettings.SiteName}-{globalSettings.ProjectName}";
+ if (globalSettings.Syslog.Destination.Equals("local", StringComparison.OrdinalIgnoreCase))
+ {
+ config.WriteTo.LocalSyslog(appName);
+ }
+ else if (Uri.TryCreate(globalSettings.Syslog.Destination,UriKind.Absolute, out var syslogAddress))
+ {
+ // Syslog's standard port is 514 (both UDP and TCP). TLS does not have a standard port, so assume 514.
+ int port = syslogAddress.Port >= 0
+ ? syslogAddress.Port
+ : 514;
+
+ if (syslogAddress.Scheme.Equals("udp"))
+ {
+ config.WriteTo.UdpSyslog(syslogAddress.Host, port, appName);
+ }
+ else if (syslogAddress.Scheme.Equals("tcp"))
+ {
+ config.WriteTo.TcpSyslog(syslogAddress.Host, port, appName);
+ }
+ else if (syslogAddress.Scheme.Equals("tls"))
+ {
+ // TLS v1.1, v1.2 and v1.3 are explicitly selected (leaving out TLS v1.0)
+ const SslProtocols protocols = SslProtocols.Tls11 | SslProtocols.Tls12 | SslProtocols.Tls13;
+
+ if (CoreHelpers.SettingHasValue(globalSettings.Syslog.CertificateThumbprint))
+ {
+ config.WriteTo.TcpSyslog(syslogAddress.Host, port, appName,
+ secureProtocols: protocols,
+ certProvider: new CertificateStoreProvider(StoreName.My, StoreLocation.CurrentUser,
+ globalSettings.Syslog.CertificateThumbprint));
+ }
+ else
+ {
+ config.WriteTo.TcpSyslog(syslogAddress.Host, port, appName,
+ secureProtocols: protocols,
+ certProvider: new CertificateFileProvider(globalSettings.Syslog.CertificatePath,
+ globalSettings.Syslog?.CertificatePassword ?? string.Empty));
+ }
+
+ }
+ }
+ }
else if (CoreHelpers.SettingHasValue(globalSettings.LogDirectory))
{
if (globalSettings.LogRollBySizeLimit.HasValue)