安裝與啟動服務
rsyslog:sudo yum install rsyslog。sudo systemctl enable --now rsyslog。配置遠程日志接收
/etc/rsyslog.conf,添加以下內容接收遠程日志(IP替換為目標服務器IP):module(load="imtcp")
input(type="imtcp" port="514")
*.* @@192.168.1.100:514 # 遠程服務器IP
sudo systemctl restart rsyslog。使用auditd記錄關鍵操作
auditd:sudo yum install audit。/etc/audit/rules.d/audit.rules,添加規則(示例):# 監控登錄事件
-w /var/log/secure -p wa -k auth_log
# 監控文件訪問(如/etc/passwd)
-w /etc/passwd -p rwa -k passwd_access
# 監控sudo命令
-w /var/log/sudo.log -p wa -k sudo_cmd
auditd:sudo systemctl restart auditd。關聯Syslog與auditd
rsyslog接收auditd日志:在/etc/rsyslog.conf中添加:module(load="imfile")
input(type="imfile" file="/var/log/audit/audit.log" tag="audit" facility="local6")
local6.* /var/log/audit_syslog.log
sudo systemctl restart rsyslog。logrotate管理日志文件,編輯/etc/logrotate.d/audit:/var/log/audit/*.log {
daily
rotate 7
compress
missingok
create 0600 root root
}
重啟logrotate:sudo systemctl restart logrotate。日志分析工具
ausearch:按關鍵字搜索審計日志,如ausearch -k passwd_access。aureport:生成審計報告,如aureport -l(登錄報告)。實時監控與告警
tail -f /var/log/audit_syslog.log實時查看日志。logwatch生成每日日志報告:sudo logwatch --output mail。rsyslog中啟用TLS加密(需配置證書),保護日志傳輸安全。sudo chmod 600 /var/log/audit/audit.log。參考來源: