6.1.3.5 Ensure rsyslog logging is configured
Audit#
Review the contents of /etc/rsyslog.conf and /etc/rsyslog.d/*.conf files to ensure appropriate logging is set. In addition, run the following command and verify that the log files are logging information as expected:
Run the following script and review the output from the rsyslog configuration to ensure appropriate logging is set an in accordance with local site policy.
Example output:
/etc/rsyslog.d/60-rsyslog.conf:auth,authpriv.* /var/log/secure
/etc/rsyslog.d/60-rsyslog.conf:mail.* -/var/log/mail
/etc/rsyslog.d/60-rsyslog.conf:mail.info -/var/log/mail.info
/etc/rsyslog.d/60-rsyslog.conf:mail.warning -/var/log/mail.warn
/etc/rsyslog.d/60-rsyslog.conf:mail.err /var/log/mail.err
/etc/rsyslog.d/60-rsyslog.conf:cron.* /var/log/cron
/etc/rsyslog.d/60-rsyslog.conf:*.=warning;*.=err -/var/log/warn
/etc/rsyslog.d/60-rsyslog.conf:*.crit /var/log/warn
/etc/rsyslog.d/60-rsyslog.conf:*.*;mail.none;news.none -/var/log/messages
/etc/rsyslog.d/60-rsyslog.conf:local0,local1.* -/var/log/localmessages
/etc/rsyslog.d/60-rsyslog.conf:local2,local3.* -/var/log/localmessages
/etc/rsyslog.d/60-rsyslog.conf:local4,local5.* -/var/log/localmessages
/etc/rsyslog.d/60-rsyslog.conf:local6,local7.* -/var/log/localmessages
/etc/rsyslog.d/50-default.conf:auth,authpriv.* /var/log/auth.log #<- Will be ignored
/etc/rsyslog.d/50-default.conf:*.*;auth,authpriv.none -/var/log/syslog
/etc/rsyslog.d/50-default.conf:kern.* -/var/log/kern.log
/etc/rsyslog.d/50-default.conf:mail.* -/var/log/mail.log #<- Will be ignored
/etc/rsyslog.d/50-default.conf:mail.err /var/log/mail.err #<- Will be ignored
Note:
- Output is generated as \<CONFIGURATION_FILE>:<PARAMETER>
- Files are listed in order of precedence. If the same parameter is listed multiple times, only the first occurrence will be used be the rsyslog daemon
Remediation#
Edit the following lines in the configuration file(s) returned by the audit as appropriate for your environment.
Note: The below configuration is shown for example purposes only. Due care should be given to how the organization wishes to store log data.
*.emerg :omusrmsg:*
auth,authpriv.* /var/log/secure
mail.* -/var/log/mail
mail.info -/var/log/mail.info
mail.warning -/var/log/mail.warn
mail.err /var/log/mail.err
cron.* /var/log/cron
*.=warning;*.=err -/var/log/warn
*.crit /var/log/warn
*.*;mail.none;news.none -/var/log/messages
local0,local1.* -/var/log/localmessages
local2,local3.* -/var/log/localmessages
local4,local5.* -/var/log/localmessages
local6,local7.* -/var/log/localmessages
Run the following command to reload the rsyslogd configuration: