SFTP日志分析全流程
一 日志来源与定位
tail -f /var/log/auth.log 或 tail -f /var/log/securegrep 'sftp' /var/log/auth.log、grep 'Failed password' /var/log/secure/etc/rsyslog.conf 或 /etc/rsyslog.d/*.conf 中调整输出路径与规则。二 日志配置与增强
Subsystem sftp internal-sftp -l INFO -f AUTHSubsystem sftp /usr/lib64/ssh/sftp-server -l INFO -f AUTHLogLevel INFO(可选 VERBOSE 获取更详细记录)auth,authpriv.* /var/log/sftp.logsystemctl restart sshd rsyslogauditctl -w /var/log/secure -p wa -k sftp_activityausearch -k sftp_activitychown root:root /var/log/auth.log; chmod 600 /var/log/auth.log。三 命令行快速分析
awk '/sftp.*username/ {count++} END {print "用户", "username", "连接次数:", count}' /var/log/auth.loggrep 'Failed password' /var/log/secure | awk '{print $(NF-3)}' | sort | uniq -c | sort -nrtail -F /var/log/secure | awk '/Failed password/ {ip=$(NF-3); if(++c[ip]>5) print "ALERT:", ip, "failed", c[ip], "times"}'sed -n '/Dec 6 10:/,/Dec 6 11:/p' /var/log/auth.log | grep sftpgrep -c 'sftp-server' /var/log/secure四 可视化与集中化分析
sftp-logs-YYYY.MM.dd),在 Kibana 中建立索引模式并构建仪表盘(登录成功/失败趋势、Top IP、Top 用户、异常时段等)。五 安全监控与告警实践
fail2ban-client status sshdomprog)推送至企业微信/钉钉/Slack;