In this tip, we'll introduce you to syslog-ng (syslog next generation), an open source audit trail processing tool created by BalaBit IT Security (now One Indentity) that can be used as an alternative to standard UNIX system logging software. We'll show you how to configure syslog-ng for use with VShell for UNIX and give you two filtering examples to log specific VShell log entries to unique files.
System administrators and IT professionals: gone are the days when we only used log files as a simple troubleshooting tool. In an increasingly internet-driven business environment, log files today are as valuable as "gold in them, there hills." They are now used as evidence to document wrong doing, for audit trails, and to keep your finger on the pulse of your networks.
If you're struggling with using syslog to manage the log files on your network and perform further analysis or audits, you might want to take a look at syslog-ng, the open source audit trail processing tool. syslog-ng has many advantages over syslog including more powerful configuration options, filtering based on message content, and better network forwarding.
This tip assumes that you've already installed syslog-ng on your VShell server according to One Identity's instructions. You can get the latest version of syslog-ng from the One Identity website.
With syslog-ng, you can set up filters, send log entries to both your local machine and to a centralized secure logging server (using SSH port-forwarding), log to a mysql database, or rewrite log messages into a specific format. In this tip, we'll illustrate two examples of using filtering to log specific VShell log entries to unique files. At the end of this tip, we've provided additional resources that you can use to explore some of syslog-ng's other capabilities.
Let's suppose you are sending all your syslog data to a centralized logging facility to be analyzed by your security team. Now, suppose that you have a helpdesk or operations person in charge of managing and troubleshooting any problems that might arise on VShell. That helpdesk person needs access to the VShell log information, but you don't want to give them access to the central logs.
The syslog-ng configuration has five main sections (Options, Source, Destination, Filter, and Log). The Options section allows you to define options specific to the program itself. The Source and Destination sections allow you to define where log information comes from and where it will go. The Filter section allows you to define specific information to pull out of the incoming stream of information. The Log statements then tie together the source, destination, and filter information into specific logs.
The two destination statements below would instruct syslog-ng to place specific VShell log messages in two separate destinations (in this example, the destinations are files). (When using plain syslogd, these log messages are placed in "messages.log"). The first statement creates a destination named "program_vshell" that points to the file "/var/log/vshell.log". The second statement creates a destination named "vshell_sftp" that points to a file called "/var/log/vshell_sftp.log".
syslog-ng.conf example destination statements:
destination program_vshell { file("/var/log/vshell.log");
};
destination vshell_sftp { file("/var/log/vshell_sftp.log");
};
Below are two different filtering examples. The first filter is named "f_vshell" and instructs syslog-ng to filter out those messages with the program named vshell. The second example creates a filter named "f_vshell_sftp", which will filter out log messages that belong to the program named vshell and any of those messages that contain the string ": sftp," (which in this case are all secure file transfer log messages).
syslog-ng.conf example filter statements:
filter f_vshell { program(vshell); };
filter f_vshell_sftp { program (vshell) and match(": sftp,");
};
You then tie them all together with log expressions to make sure the desired events end up in the right files or destinations. The first log statement below instructs syslog-ng to take anything coming from the source(src) that matches the filter(f_vshell) and send it to the destination(program_vshell).
syslog-ng.conf example log statements:
log { source(src); filter(f_vshell); destination(program_vshell);
};
log { source(src); filter(f_vshell_sftp); destination(vshell_sftp); };
Here is the sample config file in its entirety: syslog-ng.conf.text (for this config file to work properly, you should save the file without the .txt extension).
For further information about syslog-ng visit the syslog-ng FAQ
Log files can be first-clue-indicators of the actions or incidents occurring on your networks. A number of federal acts regulate auditing requirements, including HIPAA, Sarbanes-Oxley, and the Gramm-Leach-Bliley Banking Act. These acts require medical, financial, and publicly traded companies (and in some cases organizations associated with these businesses) to satisfy specific logging and auditing requirements.
VanDyke Software uses cookies to give you the best online experience. Before continuing to use this site, please confirm that you agree to our use of cookies. Please see our Cookie Usage for details.
Here you can control cookies using the checkboxes below. Some cookies are essential for the use of our website and cannot be disabled. Others provide a convenience to the user and, if disabled, may reduce the ease of use of our site. Finally, some cookies provide anonymous analytic tracking data that help us provide the user with a richer browsing experience. You can elect to disable these cookies as well.