The nats type is used for NATS communications It is available for Windows and Linux Agents.
Available settings:
Basic settings tab:
Name (required)—a unique name for this type of resource. Must contain from 1 to 128 Unicode characters.
Tenant (required)—name of the tenant that owns the resource.
Type (required)—connector type.
URL (required)—URL that you need to connect to.
Topic (required)—the topic for NATS messages. Must contain from 1 to 255 Unicode characters.
Delimiter is used to specify a character representing the delimiter between events. By default, \n is used.
Description—up to 256 Unicode characters describing the resource.
Advanced settings tab:
Buffer size is used to set a buffer size for the connector. The default value is 16 KB, and the maximum value is 64 KB.
GroupID—the GroupID parameter for NATS messages. Must contain from 1 to 255 Unicode characters. The default value is io.nats.
Workers—used to set worker count for the connector. The default value is 1.
Character encoding setting specifies character encoding. The default value is UTF-8.
Storage ID is a NATS storage identifier.
TLS mode specifies whether TLS encryption is used:
Disabled (default)—do not use TLS encryption.
Enabled—use encryption without certificate verification.
With verification—use encryption with verification that the certificate was signed with the KUMA root certificate. The root certificate and key of KUMA are created automatically during program installation and are stored on the KUMA Core server in the folder /opt/kaspersky/kuma/core/certificates/.
Custom CA—use encryption with verification that the certificate was signed by a Certificate Authority. The secret containing the certificate is selected from the Custom CA drop-down list, which is displayed when this option is selected.
To use this TLS mode, you must do the following on the KUMA Core server (OpenSSL commands are used in the examples below):
Create the key that will be used by the Certificate Authority.
Example command: openssl genrsa -out ca.key 2048
Generate a certificate for the key that was just created.
Example command: openssl req -new -x509 -days 365 -key ca.key -subj "/CN=<common host name of Certificate Authority>" -out ca.crt
Create a private key and a request to have it signed by the Certificate Authority.
Example command: openssl req -newkey rsa:2048 -nodes -keyout server.key -subj "/CN=common host name of KUMA server>" -out server.csr
Create a certificate signed by the Certificate Authority. The subjectAltName must include the domain names or IP addresses of the server for which the certificate is being created.
The obtained server.crt certificate should be uploaded in the KUMA web interface as a certificate-type secret, which should then be selected from the Custom CA drop-down list.
When using TLS, it is impossible to specify an IP address as a URL.
Compression—you can use Snappy compression. By default, compression is disabled.
Debug—a drop-down list where you can specify whether resource logging should be enabled. By default it is Disabled.