安装与启动服务
rsyslog:sudo yum install rsyslog。sudo systemctl enable --now rsyslog。配置远程日志接收
/etc/rsyslog.conf,添加以下内容接收远程日志(IP替换为目标服务器IP):module(load="imtcp") input(type="imtcp" port="514") *.* @@192.168.1.100:514 # 远程服务器IP sudo systemctl restart rsyslog。使用auditd记录关键操作
auditd:sudo yum install audit。/etc/audit/rules.d/audit.rules,添加规则(示例):# 监控登录事件 -w /var/log/secure -p wa -k auth_log # 监控文件访问(如/etc/passwd) -w /etc/passwd -p rwa -k passwd_access # 监控sudo命令 -w /var/log/sudo.log -p wa -k sudo_cmd auditd:sudo systemctl restart auditd。关联Syslog与auditd
rsyslog接收auditd日志:在/etc/rsyslog.conf中添加:module(load="imfile") input(type="imfile" file="/var/log/audit/audit.log" tag="audit" facility="local6") local6.* /var/log/audit_syslog.log sudo systemctl restart rsyslog。logrotate管理日志文件,编辑/etc/logrotate.d/audit:/var/log/audit/*.log { daily rotate 7 compress missingok create 0600 root root } 重启logrotate:sudo systemctl restart logrotate。日志分析工具
ausearch:按关键字搜索审计日志,如ausearch -k passwd_access。aureport:生成审计报告,如aureport -l(登录报告)。实时监控与告警
tail -f /var/log/audit_syslog.log实时查看日志。logwatch生成每日日志报告:sudo logwatch --output mail。rsyslog中启用TLS加密(需配置证书),保护日志传输安全。sudo chmod 600 /var/log/audit/audit.log。参考来源: