安装与启动服务
rsyslog:sudo yum install rsyslog。sudo systemctl enable --now rsyslog。配置远程日志接收
/etc/rsyslog.conf,添加以下内容接收远程日志(IP替换为目标服务器IP):module(load="imtcp")
input(type="imtcp" port="514")
*.* @@192.168.1.100:514 # 远程服务器IP
sudo systemctl restart rsyslog。使用auditd记录关键操作
auditd:sudo yum install audit。/etc/audit/rules.d/audit.rules,添加规则(示例):# 监控登录事件
-w /var/log/secure -p wa -k auth_log
# 监控文件访问(如/etc/passwd)
-w /etc/passwd -p rwa -k passwd_access
# 监控sudo命令
-w /var/log/sudo.log -p wa -k sudo_cmd
auditd:sudo systemctl restart auditd。关联Syslog与auditd
rsyslog接收auditd日志:在/etc/rsyslog.conf中添加:module(load="imfile")
input(type="imfile" file="/var/log/audit/audit.log" tag="audit" facility="local6")
local6.* /var/log/audit_syslog.log
sudo systemctl restart rsyslog。logrotate管理日志文件,编辑/etc/logrotate.d/audit:/var/log/audit/*.log {
daily
rotate 7
compress
missingok
create 0600 root root
}
重启logrotate:sudo systemctl restart logrotate。日志分析工具
ausearch:按关键字搜索审计日志,如ausearch -k passwd_access。aureport:生成审计报告,如aureport -l(登录报告)。实时监控与告警
tail -f /var/log/audit_syslog.log实时查看日志。logwatch生成每日日志报告:sudo logwatch --output mail。rsyslog中启用TLS加密(需配置证书),保护日志传输安全。sudo chmod 600 /var/log/audit/audit.log。参考来源: