iptables.conf.old 1.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041
  1. # /etc/rsyslog.d/iptables.conf
  2. if ( $msg contains ' iptables ')
  3. then {
  4. /var/log/iptables/all.log
  5. }
  6. if ( $msg contains ' iptables dropped')
  7. then {
  8. /var/log/iptables/drop.log
  9. }
  10. if ( $msg contains ' iptables rejected')
  11. then {
  12. /var/log/iptables/reject.log
  13. stop
  14. }
  15. if ( $msg contains ' iptables dropped' or $msg contains ' iptables rejected')
  16. then {
  17. /var/log/iptables/troubleshoot.log
  18. stop
  19. }
  20. if ( $msg contains ' iptables clutter dropped: ')
  21. then {
  22. /var/log/iptables/clutter.log
  23. stop
  24. }
  25. if ( $msg contains ' iptables attack dropped: ')
  26. then {
  27. /var/log/iptables/attack.log
  28. stop
  29. }
  30. if ( $msg contains ' iptables dropped spoof: ' or $msg contains 'iptables droped SSH flood: ' or $msg contains 'iptables dropped HTTP flood: ' or $msg contains 'iptables dropped HTTPS flood: ' or $msg contains 'iptables dropped 127.0.0.0/8, from non localhost: ')
  31. then {
  32. /var/log/iptables/attack.log
  33. stop
  34. }
  35. if ( $msg contains ' iptables allowed DHCP: ')
  36. then{
  37. /var/log/iptables/dhcp.log
  38. stop
  39. }