How-to enable TLS secured Remote Logging connection in ctrlX OS 1.20
In ctrlX OS 1.20, TLS configurations can be configured via configuration file, only. The frontend does not yet provide the option to create connections to endpoints with TLS verification. This document describes the required steps to setup a remote logging configuration via "Manage App Data" and configuration files.
Please note the current limitations and known issues.
Please see also actual XCR-V-0120 documentation (without TLS): Diagnosis / Remote Logging
Configuration files
filters.json
[
{
"Id": "000d2c60-6ac8-4601-a8ef-2fd599de7b7b",
"FiltersCfg": []
}
]>div<
Please note that the file must be named filters.json. The ID may be choosen freely, but must be unique.
targets.json
[
{
"id": "000d2c60-6ac8-4601-a8ef-2fd599de7b7b",
"name": "testtls",
"url": "tls://10.0.2.2:55999",
"enabled": true,
"tag": "empty",
"messageFormat": "RFC5424",
"messageFramer": "none",
"tlsConfig": {
"certificate": "client-vir-cert.pem",
"key": "client-vir-key.pem",
"ca": "ca-cert.pem",
"skipServerCertificateVerification": false
}
}
]
Please note that
The file must be named targets.json.
The ID must be identical to the ID in filters.json.
The URL ("url") must start with the prefix "tls://".
The certificate, key and ca certificate ("certificate", "key", "ca" under "tlsConfig") must be located in the certificate store "Network security" and must be named as stated in the configuration file. Depending on the use case, not all files are required. Please refer to the installation steps as described below for further details.
Installation Steps (Keys & certificates)
If either the server certificate shall be verified and/or the client must authenticate against the server, the required files must be made available in the certificate store "Network security" in the certificate management:
certificate and key stores on ctrlX CORE
Use Case: Server Verification only
For the verification of the server certificate, the ca certificate file must be stored in the certificate store "Network Security" as a "ca" certificate. Please ensure that the name of the file is identical to the one stated in targets.json.
Certificate Store of Network security service
Use Case: Mutual authentication
If additionally the remote logging server requires client authentication, the client certificate file must be made available as "own" certificate in the certificate store "Network Security" in the certificate manager. The client private key file needs to be made available as "own" key in the certificate store "Network Security" in the certificate manager. Please ensure that the names of the files are identical to the ones stated in targets.json.
Certificate store Network security
Key store Network security
Upload the configuration (filters.json, targets.json)
1: Open "Manages app data"
Home screen
2: Go to "Log Management settings":
Manage Data main page
3: Upload filters.json and targets.json
Manage App data view of remote logging
Or modify existing filters.json and targets.json. Then "Save" the settings.
Edit view in Mange app data
4: Restart device
For the settings to take effect, the device must be restarted.
Known issues / limitations
TLS configurations are displayed in the UI, but cannot be modified.
A restart of the device is required for the settings to take effect.
... View more