Uploading Edge SWG Access Logs to Cloud SWG Hosted Reporting: Two Deployment Scenarios

When integrating Symantec/Broadcom Edge SWG (formerly ProxySG) with Cloud SWG Hosted Reporting, there are two supported approaches:

  • Scenario A: Upload logs directly from Edge SWG to Cloud SWG via SCP.
  • Scenario B: Deliver logs to a staging server (e.g., Ubuntu) first, then forward them to Cloud SWG.

This article describes both methods, common pitfalls, and how to verify that your logs are visible in Hosted Reporting.


Architecture Overview

Scenario A (Direct)                  Scenario B (Via Staging)

+-------------+                      +-------------+
|  Edge SWG   |                      |  Edge SWG   |
|             |                      |             |
|  Access     |                      |  Access     |
|  Logs       |                      |  Logs       |
+------+------+                      +------+------+
       | SCP (SSH)                          | SCP (SSH)
       v                                    v
+-------------+                      +-------------+
| Cloud SWG   |                      |  Ubuntu     |
| Hosted      |                      |  Staging    |
| Reporting   |                      |  Server     |
+-------------+                      +------+------+
                                            | SCP (SSH)
                                            v
                                     +-------------+
                                     | Cloud SWG   |
                                     | Hosted      |
                                     | Reporting   |
                                     +-------------+

Scenario A: Direct Upload from Edge SWG to Cloud SWG

Step 1. Prepare in the Cloud SWG Portal

  • Enable Hosted Reporting.
  • Generate and download the SCP client private key (PEM format).
  • Note the username (customerXXXXX).
  • Find a upload server (e.g., upload-apac1.threatpulse.com)
    • You can configure the server as upload-<region>.threatpulse.com (for example upload-apac1.threatpulse.com).
    • Alternatively, you may use nslookup to resolve the hostname and input the corresponding IP address.

See the official documentation for the latest list of hostnames and IPs.

Step 2. Import the Private Key on Edge SWG

conf t
ssh-client
  client-keys
    inline rsa my_eof_marker
-----BEGIN RSA PRIVATE KEY-----
(paste the full key here)
-----END RSA PRIVATE KEY-----
my_eof_marker
exit

Verify with:

show ssh-client client-keys

Step 3. Add Cloud SWG Host to Known Hosts

Add the host fingerprint for upload-<region>.threatpulse.com or it’s IP address.

Step 4. Configure Access Log Upload

  • GUI: Access Logging → Edit log (main) → Upload Client = SCP.
  • Settings: server = upload-<region>.threatpulse.com or IP address, authentication = client-key cloudswg_scp, enable gzip.
  • In the SCP client configuration, you must enter the username provided by Cloud SWG (e.g., customerXXXXX).
  • The path field should remain empty — Cloud SWG will place the logs automatically in the correct directory.
  • Specify the authentication-method as client-key.
access-log
  edit log main
    scp-client
      authentication-method client-key

Step 5. Test Upload

Use Upload Now. In the Event Log you should see:

  • SSH: Authenticated to upload-…
  • Access Log … Upload completed successfully.

Within 5–10 minutes, data should appear in Cloud SWG Hosted Reporting.


Scenario B: Upload via a Staging Server

Step 1. Prepare in the Cloud SWG Portal

Same as Scenario A: enable Hosted Reporting, download the private key, and note host and username.

Step 2. Add Staging Server Host to Known Hosts

Add the host fingerprint for Staging Server IP address.

Step 3. Configure Edge SWG → Staging

  • Add an Upload Client pointing to the Ubuntu server (FTP/SFTP/SCP).
  • Directory = /uploadlogs, authentication with a dedicated username(edgeupload)/password.
  • Enable gzip.

Step 4. Configure Ubuntu Staging → Cloud SWG

  • Create a dedicated user:
sudo adduser edgeupload
sudo mkdir -p /home/edgeupload/uploadlogs
sudo chown edgeupload:edgeupload /home/edgeupload/uploadlogs
  • Install OpenSSH:
sudo apt update
sudo apt install openssh-server -y
  • Place the private key:
mkdir -p /home/edgeupload/.ssh
cp privateKey /home/edgeupload/.ssh/upload_threatpulse.key
chown -R edgeupload:edgeupload /home/edgeupload/.ssh
chmod 700 /home/edgeupload/.ssh
chmod 600 /home/edgeupload/.ssh/upload_threatpulse.key
  • Test upload:
su - edgeupload
cd /home/edgeupload/uploadlogs
scp -i ~/.ssh/upload_threatpulse.key *.log.gz \
    customerXXXXX@upload.threatpulse.com:

Verification in Cloud SWG Reports

  • Log in to the Cloud SWG Portal → Reports.
  • Set Log Source = hosted (to only see Hosted Reporting logs).
  • Set Data Path = Cloud SWG.
  • Run the report. Within 5–10 minutes, uploaded logs should appear.

Troubleshooting Notes

1. Private key permissions too open:

Permissions 0644 for 'privateKey' are too open.
This private key will be ignored.

Fix:

chmod 600 /home/edgeupload/.ssh/upload_threatpulse.key
chmod 700 /home/edgeupload/.ssh

2. KEX successful but authentication failed:

SSH: kex successful with peer ...
Permission denied (publickey,...)

This means the secure channel was established but authentication failed.
Root causes:

  • The private key file contained extra spaces, blank lines, or hidden characters when pasted.
  • The key was not in the correct PEM format.

Fix:

  • Re-download the PEM private key from the Cloud SWG portal.
  • Carefully check the file to ensure there are no extra spaces, empty lines, or non-printable characters.

3. Upload Now shows “% Access Log : Nothing to upload. Try again later.”

Fix:

  • This usually means that no access logs have been generated yet.
  • Try browsing some websites to generate traffic and trigger log entries.
  • You can verify whether logs are being created under Reports → Access Logging in the Edge SWG management console. Make sure you select the correct log name.
  • Also ensure that Enable Access Logging is turned on and the Default Logging Policy is properly configured.

Leave a Reply

Your email address will not be published. Required fields are marked *