1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere 6.7 PostgreSQL V1R1
  4. VCPG-67-000022 – Rsyslog must be configured to monitor VMware Postgres logs – log

VCPG-67-000022 – Rsyslog must be configured to monitor VMware Postgres logs – log

Details

For performance reasons, rsyslog file monitoring is preferred over configuring VMware Postgres to send events to a syslog facility. Without ensuring that logs are created, that rsyslog configs are created, and that those configs are loaded, the log file monitoring and shipping will not be effective.

Satisfies: SRG-APP-000359-DB-000319, SRG-APP-000360-DB-000320, SRG-APP-000092-DB-000208

Solution

Navigate to and open /etc/vmware-syslog/stig-services-vpostgres.conf.

Create the file if it does not exist.

Set the contents of the file as follows:

input(type=’imfile’
File=’/var/log/vmware/vpostgres/serverlog.std*’
Tag=’vpostgres-first’
Severity=’info’
Facility=’local0′)

input(type=’imfile’
File=’/var/log/vmware/vpostgres/postgresql-*.log’
Tag=’vpostgres’
Severity=’info’
Facility=’local0′)

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles