TABLE OF CONTENTS
By granularly encrypting each file, Atakama is able to record user interactions with those files and generate a log file.
Download the Atakama Log Server binary:
Windows binary: https://atakama-log-server.s3.amazonaws.com/atakama-logger-0.5.8.exe
Linux (Ubuntu) binary: https://atakama-log-server.s3.amazonaws.com/atakama-logger-0.5.8-ubuntu1804
On Linux, mark the file as executable: chmod +x atakama-logger. Note that the binary may be deployed somewhere in the $PATH, such as /usr/local/bin.
On Windows, as a prerequisite the latest version of the Microsoft Visual C++ Redistributable must be installed. This is necessary for the server to start and function correctly. In addition, you will need to download and install the AWS root certificate (the first one) from here.
Run the Log Server:
Generate a new private key for the server, and save it to the default config file:
Open this config file in a text editor. It’s location is:
on Windows: “%appdata%\Atakama\server.cfg”
on Linux: "~/.config/atakama/goblin/server.cfg"Configure an output type. Here’s an example file:
This will write all events in JSON lines format to /tmp/atakama-events.log.
Here’s an example for Logstash output, where <endpoint> is the endpoint you configured for your HTTP input plugin:And finally, for an RFC 3164-compatible syslog server:
Note that if unspecified, the port will default to 514.
Obtain the server’s ID, which will be used when connecting an Atakama instance to the server.
Save this value where it can be later referenced.
Start the server:
To exit, just hit Ctrl-C and the server will shut down cleanly.