pacct() options
This section describes the options of the pacct() source in syslog-ng OSE.
The pacct() driver has the following options:
file()
Type: | filename with path |
Default: | /var/log/account/pacct |
Description: The file where the process accounting logs are stored — syslog-ng OSE reads accounting messages from this file.
follow-freq()
Type: | number |
Default: | 1 |
Description: This is useful for files that always indicate readability, even though
no new content has been appended (e.g., regular file system files).
In pre-4.9 versions of syslog-ng OSE, where follow-method() was not yet available,
this indicated that the source should be checked periodically. If this value is higher than zero,
syslog-ng OSE will not attempt to use kqueue or ivykis file change notification
methods on the file (poll(), epoll(), etc.), but instead checks whether the file has changed every time the follow-freq()
interval (in seconds) has elapsed.
In version 4.9 and later, this option only has an effect if follow-method() is set to legacy
or poll
,
in which case it is used as in pre-4.9 versions.
For any other follow-method() values, the value of this option is ignored.
Floating-point numbers (for example, 1.5) can be used as well.
CAUTION: As the follow-freq(), follow-method(), monitor-method(), and the monitor-freq() options could have performance penalty effects, it is important to understand how the file and directory monitoring operates depending on these values. For details, refer to How content changes are followed in file() and wildcard-file() sources.
hook-commands()
Description: This option makes it possible to execute external programs when the relevant driver is initialized or torn down. The hook-commands() can be used with all source and destination drivers with the exception of the usertty() and internal() drivers.
NOTE: The syslog-ng OSE application must be able to start and restart the external program, and have the necessary permissions to do so. For example, if your host is running AppArmor or SELinux, you might have to modify your AppArmor or SELinux configuration to enable syslog-ng OSE to execute external applications.
Using the hook-commands() when syslog-ng OSE starts or stops
To execute an external program when syslog-ng OSE starts or stops, use the following options:
startup()
Type: | string |
Default: | N/A |
Description: Defines the external program that is executed as syslog-ng OSE starts.
shutdown()
Type: | string |
Default: | N/A |
Description: Defines the external program that is executed as syslog-ng OSE stops.
Using the hook-commands() when syslog-ng OSE reloads
To execute an external program when the syslog-ng OSE configuration is initiated or torn down, for example, on startup/shutdown or during a syslog-ng OSE reload, use the following options:
setup()
Type: | string |
Default: | N/A |
Description: Defines an external program that is executed when the syslog-ng OSE configuration is initiated, for example, on startup or during a syslog-ng OSE reload.
teardown()
Type: | string |
Default: | N/A |
Description: Defines an external program that is executed when the syslog-ng OSE configuration is stopped or torn down, for example, on shutdown or during a syslog-ng OSE reload.
Example: Using the hook-commands() with a network source
In the following example, the hook-commands() is used with the network() driver and it opens an iptables port automatically as syslog-ng OSE is started/stopped.
The assumption in this example is that the LOGCHAIN chain is part of a larger ruleset that routes traffic to it. Whenever the syslog-ng OSE created rule is there, packets can flow, otherwise the port is closed.
source {
network(transport(udp)
hook-commands(
startup("iptables -I LOGCHAIN 1 -p udp --dport 514 -j ACCEPT")
shutdown("iptables -D LOGCHAIN 1")
)
);
};