| Chapter 1: Foundations of Kali Linux




Download 22,59 Mb.
Pdf ko'rish
bet38/225
Sana14.05.2024
Hajmi22,59 Mb.
#232856
1   ...   34   35   36   37   38   39   40   41   ...   225
Bog'liq
learningkalilinux

32 | Chapter 1: Foundations of Kali Linux


Table 1-1. Syslog facilities
Facility number Facility Description
0
kern
Kernel messages
1
user
User-level messages
2
mail
Mail system
3
daemon System daemons
4
auth
Security/authorization messages
5
syslog
Messages generated internally by syslogd
6
lpr
Line printer subsystem
7
news
Network news subsystem
8
uucp
UUCP subsystem
9
Clock daemon
10
authpriv Security/authorization messages
11
ftp
FTP daemon
12
-
NTP subsystem
13
-
Log audit
14
-
Log alert
15
cron
Scheduling daemon
16
local0
Local use 0 (local0)
17
local1
Local use 1 (local1)
18
local2
Local use 2 (local2)
19
local3
Local use 3 (local3)
20
local4
Local use 4 (local4)
21
local5
Local use 5 (local5)
22
local6
Local use 6 (local6)
23
local7
Local use 7 (local7)
Along with the facility is the severity. The severity has potential values of Emergency,
Alert, Critical, Error, Warning, Notice, Informational, and Debug. These severities
are listed in descending order, with the most severe listed first. You may determine
that Emergency logs should be sent somewhere different from other severity levels. In
Example 1-8
, all of the severities are being sent to the log associated with each facility.
The “*” after the facility name indicates all facilities. If you wanted to, for instance,
send errors from the auth facility to a specific log file, you would use 
auth.error
and
indicate the file you want to use.
Once you know where the logs are kept, you need to be able to read them. Fortu‐
nately, syslog log entries are easy enough to parse. If you look at 
Example 1-11
, you
will see a collection of log entries from the 
auth.log
on a Kali system. Starting on the

Download 22,59 Mb.
1   ...   34   35   36   37   38   39   40   41   ...   225




Download 22,59 Mb.
Pdf ko'rish