Configuration File
The agent configuration is stored in:- Linux:
/opt/utmstack/agent/config.yml - Windows:
C:\Program Files\UTMStack\Agent\config.yml
Initial Configuration
During installation, you’ll be prompted for:Server Address
The hostname or IP address of your UTMStack server:Agent Registration Key
The unique key provided by your UTMStack deployment:Configuration Components
Server Connection
The agent communicates with the server through multiple ports:- Agent Manager Port: Primary communication channel
- Log Auth Proxy Port: Secure log transmission
- Dependencies Port: Updates and dependencies
SSL/TLS Settings
Skip Certificate Validation
In test environments, you may need to skip SSL certificate validation. This is configured during installation.Custom TLS Certificates
For integrations requiring TLS (like syslog over TLS), load custom certificates:- Certificate:
/opt/utmstack/agent/certs/integration.crt - Private Key:
/opt/utmstack/agent/certs/integration.key - CA Certificate:
/opt/utmstack/agent/certs/integration-ca.crt
Log Retention
The agent stores logs locally before transmission. Configure retention to manage disk space:Integration Settings
Integrations are enabled/disabled through CLI commands, which update the configuration automatically.Common Configuration Tasks
Change Integration Port
If the default port conflicts with another service:Enable Integration with TLS
For secure log transmission:Disable Integration
Disabling an integration automatically disables TLS if it was enabled:Collector Configuration
The agent uses Beat collectors (Filebeat, Metricbeat, etc.) which are configured automatically during:- Initial installation
- Integration enable/disable operations
- Port changes
Data Storage
The agent maintains a local SQLite database for:- Buffering logs before transmission
- Storing configuration metadata
- Managing retention policies
- Linux:
/opt/utmstack/agent/data/agent.db - Windows:
C:\Program Files\UTMStack\Agent\data\agent.db
Manual Log Cleanup
To clean old logs based on retention policy:Best Practices
Production Environments
- Use Custom TLS Certificates: Load your own certificates instead of using auto-generated ones
- Enable Certificate Validation: Never skip SSL certificate validation
- Set Appropriate Retention: Balance between buffer capacity and disk space
- Monitor Disk Usage: Ensure sufficient disk space for log buffering
Security
- Protect Configuration Files: Restrict access to configuration files containing sensitive data
- Use Strong TLS: Enable TLS for all integrations in production
- Regular Updates: Keep the agent updated for security patches
Performance
- Adjust Retention: Lower retention for high-volume environments
- Monitor Resources: Watch CPU and memory usage
- Clean Logs Regularly: Use the clean-logs command if needed
Configuration Validation
The agent automatically validates configuration during:- Installation
- Configuration changes
- Service startup
Viewing Current Configuration
To check the current agent status and configuration, check the service logs or use the help command:Next Steps
Agent Commands
Complete CLI command reference
Windows Agent
Windows-specific configuration
Linux Agent
Linux-specific configuration