Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

IguanaX 10.1.105 introduces the ability to enable and disable log encryption to secure data at rest stored in your IguanaX Log Directory on disk.

Before configuring log encryption on your IguanaX instance, review Enabling Log Encryption for important security and administrative considerations.

If upgrading from a previous IguanaX version, old unencrypted logs will remain in the logt log directory and a new log directory called loge will be generated by Iguana to store encrypted logs. You will no longer be able to access the old logs in the logt directory when log encryption is enabled.

Log encryption can be quickly enabled and disabled in Iguana’s Settings:

 STEP 1: Click EDIT to enable log encryption
  1. Click Edit and choose Enabled using the dropdown.

  2. Use the three dots to have Iguana generate an Encryption key.

If you are enabling log encryption on an existing IguanaX instance, you must first stop all components as the service will need to restart.

 STEP 2: Generate an Encryption Key

Iguana will supply you with a 32-character encryption key to use as a key to encrypt the logs. You can use the regenerate button to have Iguana generate a new key for you to copy.

Copy this key for the next step. You will be responsible for documenting the encryption key generated by Iguana as it will be required each time you restart the Iguana instance.

 STEP 3: Configure your Encryption Key
  1. Copy the encryption key into the Encryption Key and Confirm Encrpytion Key fields.

  2. Click Save.

A confirmation window will appear before proceeding to restart the Iguana instance and enable log encryption.

  • Confirm you have saved your encryption key in a secure location

  • Confirm you understand it will be required on every IguanaX start up.

 STEP 4: Iguana will restart, enter your encryption key and login to IguanaX
  1. Enter your Encryption Key and click Submit.

  1. Enter your login credentials as usual.

  1. Your logs will now be encrypted and stored in a new log directory, loge. You can view the new log directory in your Log Usage Settings page.

  • No labels