|
logowanie ruchu / połączeń - iptables + syslog-ng - pakowanie co dzień
06-11-2017 20:30:00 04-05-2022 19:00:00 Odwiedziny: 1833
System: Debian v6, 7, 8, 9
Wersja syslog-ng: v3
Miejsce przechowywania logów: /var/log (dowolne)
Protokół: TCP
Kompresja logów: tak
Grupowanie logów: tak, co dzień
Usuwanie starszych logów niż 365 dni: tak
Zaczynamy od instalacji syslog-ng (zastępuje domyślny rsyslog):
aptitude install syslog-ng
Do pliku /etc/syslog-ng/syslog-ng.conf dodajemy:
destination d_firewall { file("/var/log/logs_${YEAR}-${MONTH}-${DAY}.log"); };
filter f_firewall { match("IPTABLES"); };
log { source(s_src); filter(f_firewall); destination(d_firewall); };
Dodatkowo dodaj do każdego filteru (tak, aby połacznia nie lądowały także np. w /var/log/syslog):
and not filter (f_firewall)
Finalnie config dla syslog-ng v3.8 ma wyglądać tak:
@version: 3.8
@include "scl.conf"
# Syslog-ng configuration file, compatible with default Debian syslogd
# installation.
# First, set some global options.
options { chain_hostnames(off); flush_lines(0); use_dns(no); use_fqdn(no);
owner("root"); group("adm"); perm(0640); stats_freq(0);
bad_hostname("^gconfd$");
};
########################
# Sources
########################
# This is the default behavior of sysklogd package
# Logs may come from unix stream, but not from another machine.
#
source s_src {
system();
internal();
};
# If you wish to get logs from remote machine you should uncomment
# this and comment the above source line.
#
#source s_net { tcp(ip(127.0.0.1) port(1000)); };
########################
# Destinations
########################
# First some standard logfile
#
destination d_auth { file("/var/log/auth.log"); };
destination d_cron { file("/var/log/cron.log"); };
destination d_daemon { file("/var/log/daemon.log"); };
destination d_kern { file("/var/log/kern.log"); };
destination d_lpr { file("/var/log/lpr.log"); };
destination d_mail { file("/var/log/mail.log"); };
destination d_syslog { file("/var/log/syslog"); };
destination d_user { file("/var/log/user.log"); };
destination d_uucp { file("/var/log/uucp.log"); };
# This files are the log come from the mail subsystem.
#
destination d_mailinfo { file("/var/log/mail.info"); };
destination d_mailwarn { file("/var/log/mail.warn"); };
destination d_mailerr { file("/var/log/mail.err"); };
# Logging for INN news system
#
destination d_newscrit { file("/var/log/news/news.crit"); };
destination d_newserr { file("/var/log/news/news.err"); };
destination d_newsnotice { file("/var/log/news/news.notice"); };
# Some 'catch-all' logfiles.
#
destination d_debug { file("/var/log/debug"); };
destination d_error { file("/var/log/error"); };
destination d_messages { file("/var/log/messages"); };
# The root's console.
#
destination d_console { usertty("root"); };
# Virtual console.
#
destination d_console_all { file(`tty10`); };
# The named pipe /dev/xconsole is for the nsole' utility. To use it,
# you must invoke nsole' with the -file' option:
#
# $ xconsole -file /dev/xconsole [...]
#
destination d_xconsole { pipe("/dev/xconsole"); };
# Send the messages to an other host
#
#destination d_net { tcp("127.0.0.1" port(1000) log_fifo_size(1000)); };
# Debian only
destination d_ppp { file("/var/log/ppp.log"); };
## add by kazuko.pl
destination d_firewall { file("/var/log/logs_${YEAR}-${MONTH}-${DAY}.log"); };
########################
# Filters
########################
# Here's come the filter options. With this rules, we can set which
# message go where.
filter f_dbg { level(debug) and not filter (f_firewall); };
filter f_info { level(info) and not filter (f_firewall); };
filter f_notice { level(notice) and not filter (f_firewall); };
filter f_warn { level(warn) and not filter (f_firewall); };
filter f_err { level(err) and not filter (f_firewall); };
filter f_crit { level(crit .. emerg) and not filter (f_firewall); };
filter f_debug { level(debug) and not facility(auth, authpriv, news, mail) and not filter (f_firewall); };
filter f_error { level(err .. emerg) and not filter (f_firewall); };
filter f_messages { level(info,notice,warn) and
not facility(auth,authpriv,cron,daemon,mail,news) and not filter (f_firewall); };
filter f_auth { facility(auth, authpriv) and not filter(f_debug) and not filter (f_firewall); };
filter f_cron { facility(cron) and not filter(f_debug) and not filter (f_firewall); };
filter f_daemon { facility(daemon) and not filter(f_debug) and not filter (f_firewall); };
filter f_kern { facility(kern) and not filter(f_debug) and not filter (f_firewall); };
filter f_lpr { facility(lpr) and not filter(f_debug) and not filter (f_firewall); };
filter f_local { facility(local0, local1, local3, local4, local5,
local6, local7) and not filter(f_debug) and not filter (f_firewall); };
filter f_mail { facility(mail) and not filter(f_debug) and not filter (f_firewall); };
filter f_news { facility(news) and not filter(f_debug) and not filter (f_firewall); };
filter f_syslog3 { not facility(auth, authpriv, mail) and not filter(f_debug) and not filter (f_firewall); };
filter f_user { facility(user) and not filter(f_debug) and not filter (f_firewall); };
filter f_uucp { facility(uucp) and not filter(f_debug) and not filter (f_firewall); };
filter f_cnews { level(notice, err, crit) and facility(news) and not filter (f_firewall); };
filter f_cother { level(debug, info, notice, warn) or facility(daemon, mail) and not filter (f_firewall); };
filter f_ppp { facility(local2) and not filter(f_debug) and not filter (f_firewall); };
filter f_console { level(warn .. emerg) and not filter (f_firewall); };
## add by kazuko.pl
filter f_firewall { match("IPTABLES"); };
########################
# Log paths
########################
log { source(s_src); filter(f_auth); destination(d_auth); };
log { source(s_src); filter(f_cron); destination(d_cron); };
log { source(s_src); filter(f_daemon); destination(d_daemon); };
log { source(s_src); filter(f_kern); destination(d_kern); };
log { source(s_src); filter(f_lpr); destination(d_lpr); };
log { source(s_src); filter(f_syslog3); destination(d_syslog); };
log { source(s_src); filter(f_user); destination(d_user); };
log { source(s_src); filter(f_uucp); destination(d_uucp); };
log { source(s_src); filter(f_mail); destination(d_mail); };
#log { source(s_src); filter(f_mail); filter(f_info); destination(d_mailinfo); };
#log { source(s_src); filter(f_mail); filter(f_warn); destination(d_mailwarn); };
#log { source(s_src); filter(f_mail); filter(f_err); destination(d_mailerr); };
log { source(s_src); filter(f_news); filter(f_crit); destination(d_newscrit); };
log { source(s_src); filter(f_news); filter(f_err); destination(d_newserr); };
log { source(s_src); filter(f_news); filter(f_notice); destination(d_newsnotice); };
#log { source(s_src); filter(f_cnews); destination(d_console_all); };
#log { source(s_src); filter(f_cother); destination(d_console_all); };
#log { source(s_src); filter(f_ppp); destination(d_ppp); };
log { source(s_src); filter(f_debug); destination(d_debug); };
log { source(s_src); filter(f_error); destination(d_error); };
log { source(s_src); filter(f_messages); destination(d_messages); };
log { source(s_src); filter(f_console); destination(d_console_all);
destination(d_xconsole); };
log { source(s_src); filter(f_crit); destination(d_console); };
# All messages send to a remote site
#
#log { source(s_src); destination(d_net); };
## add by kazuko.pl
log { source(s_src); filter(f_firewall); destination(d_firewall); };
###
# Include all config files in /etc/syslog-ng/conf.d/
###
@include "/etc/syslog-ng/conf.d/*.conf"
Wykonujemy restart syslog-ng:
/etc/init.d/syslog-ng restart
Dodajemy regułke, która będzie zbierała połączenia i przekazywała do syslog-ng:
iptables -A FORWARD -p tcp -m state --state NEW -j LOG --log-prefix "IPTABLES: " --log-level info
Ważne jest także kompresja tych logów, dzięki temu zyskamy więcej wolnego miejsca na dysku.
Dodatkowo każdego dnia są usuwane starsze logi niż 365 dni.
Tworzymy plik /etc/cron.d/logs oraz dodajemy:
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
1 5 5 * * root find /var/log/logs_*.gz -type f -mtime +365 -exec rm {} \;
0 1 * * * root if [ -f /var/log/logs_`date -d "1 day ago" "+\%Y-\%m-\%d"`.log ]; then gzip -9 /var/log/logs_`date -d "1 day ago" "+\%Y-\%m-\%d"`.log; fi
|
|
|