Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

SuSE firewall and syslog.conf

Posted on 2004-09-03
5
Medium Priority
?
670 Views
Last Modified: 2013-12-15
my firewall seems to be filling up all sorts of log files that i don't want it in.  okay, so that's a bit of hyperbole, but the firewall messages are showing up in /var/log/messages, /var/log/warn and /var/log/firewall.  (i don't know if it makes any difference, but it's SuSE 8.0 running kernel 2.4.18.)

i'd like to drop the loggin to messages and warn and leave everything in firewall, but i'm not sure what to do with my syslog.conf file.  below are the lines from syslog.conf that mention the three files in question:
*.=warn;*.=err                  -/var/log/warn
*.crit                           /var/log/warn
*.*;mail.none;news.none;authpriv.none;auth.none         -/var/log/messages
kern.*          -/var/log/firewall

i'm not worried about errant kernel messages appearing in the firewall file - they only account for about 1.5% of the messages.  i've found websites saying that the firewall logs to kern.=info and kern.=debug.  what about boot messages (the other 1.5% of the firewall file) - what log level do they get passed through?

thanks!
kevin
0
Comment
Question by:kevincasey
  • 2
4 Comments
 
LVL 2

Author Comment

by:kevincasey
ID: 12105701
any suggestions?  anyone?
0
 

Expert Comment

by:azcoffeehabit
ID: 12148332
Hi,

   If you are running a gui based firewall configuration program look for the logging directive for the individual firewall rules that you do not want to see and disable the logging.  

PKG
0
 
LVL 2

Author Comment

by:kevincasey
ID: 12162320
i'm not using a gui based tool.  i'm doing this by hand.

i ended up hacking this one together myself.  since i couldn't figure out what level the firewall was logging at, i ended up dumping all the kernel messages into the firewall log.  the two lines i ended up editing are below:

*.*;kern,mail,news,authpriv,auth.none           -/var/log/messages
kern.*          -/var/log/firewall
0
 
LVL 1

Accepted Solution

by:
DarthMod earned 0 total points
ID: 15749341
PAQed with points (300) refunded

DarthMod
Community Support Moderator
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
In the first part of this tutorial we will cover the prerequisites for installing SQL Server vNext on Linux.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Suggested Courses
Course of the Month6 days, 10 hours left to enroll

783 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question