| 1234567891011121314151617181920212223242526272829303132333435363738394041 |
- # /etc/rsyslog.d/iptables.conf
- if ( $msg contains ' iptables ')
- then {
- /var/log/iptables/all.log
- }
- if ( $msg contains ' iptables dropped')
- then {
- /var/log/iptables/drop.log
- }
- if ( $msg contains ' iptables rejected')
- then {
- /var/log/iptables/reject.log
- stop
- }
- if ( $msg contains ' iptables dropped' or $msg contains ' iptables rejected')
- then {
- /var/log/iptables/troubleshoot.log
- stop
- }
- if ( $msg contains ' iptables clutter dropped: ')
- then {
- /var/log/iptables/clutter.log
- stop
- }
- if ( $msg contains ' iptables attack dropped: ')
- then {
- /var/log/iptables/attack.log
- stop
- }
- if ( $msg contains ' iptables dropped spoof: ' or $msg contains 'iptables droped SSH flood: ' or $msg contains 'iptables dropped HTTP flood: ' or $msg contains 'iptables dropped HTTPS flood: ' or $msg contains 'iptables dropped 127.0.0.0/8, from non localhost: ')
- then {
- /var/log/iptables/attack.log
- stop
- }
- if ( $msg contains ' iptables allowed DHCP: ')
- then{
- /var/log/iptables/dhcp.log
- stop
- }
|