[syslog-ng]Loghost can't see its own syslogs

Doug Hanks syslog-ng@lists.balabit.hu
Sun, 26 Sep 2004 14:20:28 -0700


Hello,

I have an interesting problem.  I have a loghost with the servername
of FFLOGSVR.  Everything works wonderfully except that FFLOGSVR isn't
logging its own logs.  When I perform the command "logger FFLOGSVR" I
do not see entry in my syslog.

I have attached my syslog-ng.conf for review.

Thank you in advance,

--
- Doug Hanks = dhanks(at)gmail(dot)com

# Syslog-ng (new generation) configuration file
# syslog.conf by Doug Hanks 9/25/04

# Global options
options {
       time_reopen (10);
       log_fifo_size (1000);
       long_hostnames (on);
       use_dns (yes);
       use_fqdn (no);
       create_dirs(yes);
       dns_cache(yes);
       keep_hostname(yes);
};

# Define where the logs come from - udp and /dev/log only
source gateway {
       unix-stream("/dev/log");
       internal();
       udp(port(514));
};

# Define some filters so we can break down the logs by facility

filter f_auth { facility(auth); };
filter f_syslog { not facility(authpriv, mail); };
filter f_cron { facility(cron); };
filter f_daemon { facility(daemon); };
filter f_kern { facility(kern); };
filter f_mail { facility(mail); };
filter f_user { facility(user); };
filter f_debug { not facility(auth, authpriv, news, mail); };
filter f_messages { level(info..warn)
       and not facility(auth, authpriv, mail, news); };
filter f_emergency { level(emerg); };
filter f_info { level(info); };
filter f_notice { level(notice); };
filter f_warn { level(warn); };
filter f_crit { level(crit); };
filter f_err { level(err); };

# LogWatch
filter f_logwatch {
       match("su") or
       match("ssh") or
       match("sudo");
};

# SU
filter f_su_0 {
       match("su: from [a-zA-Z0-9]+ to") or # AIX
       match("'su [a-zA-Z0-9]+' succeeded for") or # Solaris
       match(": su : \+"); # HPUX
};

filter f_su_1 {
       match("su: BAD SU from") or # AIX
       match("'su [a-zA-Z0-9]+' failed for") or # Solaris
       match(": su : \-"); # HPUX
};

# SSH
filter f_ssh_0 {
       match("Accepted [a-zA-Z0-9]+ for") or # AIX, Solaris, and HPUX
       match("[a-zA-Z0-9]+ authentication for user [a-zA-Z0-9]+
accepted"); # SAP
};

filter f_ssh_1 {
       match("Failed [a-zA-Z0-9]+ for") or # AIX, Solaris, and HPUX
       match("[a-zA-Z0-9]+ authentication for user [a-zA-Z0-9]+ failed"); # SAP
};

# SUDO
filter f_sudo_0 { match("sudo:"); };
filter f_sudo_1 {
       match("sudo:") and
       (
               match("command not allowed") or
               match("user NOT in sudoers")
       );
};

# Define containers where you want to stuff the logs
destination localhost { file("/usr/logs/syslog/messages.all"); };
destination loghost {
       file("/usr/logs/HOSTS/$HOST/messages"
               owner(root) group(root) perm(0600) dir_perm(0700)
create_dirs(yes)
       );
};

# Program template for alerts
destination fifo_alert {
       program("/usr/local/sbin/email-syslog-alert"
               template("$HOST:$PROGRAM:$MSG\n")
               template-escape(yes)
       );
};

# SU log
destination su_0 { file("/usr/logs/syslog/messages.su0"); };
destination su_1 { file("/usr/logs/syslog/messages.su1"); };

# SSH logs
destination ssh_0 { file("/usr/logs/syslog/messages.ssh0"); };
destination ssh_1 { file("/usr/logs/syslog/messages.ssh1"); };

# SUDO logs
destination sudo_0 { file("/usr/logs/syslog/messages.sudo0"); };
destination sudo_1 { file("/usr/logs/syslog/messages.sudo1"); };

# LogWatch
destination logwatch { file("/usr/logs/syslog/logwatch.log"); };

# Regular syslogs
destination authlog { file("/usr/logs/syslog/messages.auth"); };
destination cron { file("/usr/logs/syslog/messages.cron"); };
destination daemon { file("/usr/logs/syslog/messages.daemon"); };
destination kern { file("/usr/logs/syslog/messages.kern"); };
destination lpr { file("/usr/logs/syslog/messages.lpr"); };
destination user { file("/usr/logs/syslog/messages.user"); };
destination mail { file("/usr/logs/syslog/messages.mail"); };
destination debug { file("/usr/logs/syslog/messages.debug"); };
destination messages { file("/usr/logs/syslog/messages"); };
destination console { file("/dev/console"); };

# Bring the sources, filters (if any) together and shove it in a log
(read destination)
log { source(gateway); destination(localhost); };
log { source(gateway); destination(loghost); };

# FIFO alert
log { source(gateway); filter(f_su_1); destination(fifo_alert); };
log { source(gateway); filter(f_ssh_1); destination(fifo_alert); };
log { source(gateway); filter(f_sudo_1); destination(fifo_alert); };

# Log SU to roots
log { source(gateway); filter(f_su_0); destination(su_0); };
log { source(gateway); filter(f_su_1); destination(su_1); };

# Log SSH stuff
log { source(gateway); filter(f_ssh_0); destination(ssh_0); };
log { source(gateway); filter(f_ssh_1); destination(ssh_1); };

# Log SUDO stuff
log { source(gateway); filter(f_sudo_0); destination(sudo_0); };
log { source(gateway); filter(f_sudo_1); destination(sudo_1); };

# A master log of SSH, SUDO and SU for LogWatch
log { source(gateway); filter(f_logwatch); destination(logwatch); };

# Break down the logs further
log { source(gateway); filter(f_auth); destination(authlog); };
log { source(gateway); filter(f_cron); destination(cron); };
log { source(gateway); filter(f_daemon); destination(daemon); };
log { source(gateway); filter(f_kern); destination(kern); };
log { source(gateway); filter(f_mail); destination(mail); };
log { source(gateway); filter(f_user); destination(user); };
log { source(gateway); filter(f_debug); destination(debug); };
log { source(gateway); filter(f_messages); destination(messages); };
log { source(gateway); filter(f_emergency); destination(console); };