Skip to content

System and Auditd Log Collection

Starter
Professional

To enable collection of system & auditd logs, activate journalctl_enable and auditd_enable with a Glouton configuration file:

Terminal window
sudo tee /etc/glouton/conf.d/99-logs.conf > /dev/null << 'EOF'
log.opentelemetry.auto_discovery.journalctl_enable: true
log.opentelemetry.auto_discovery.auditd_enable: true
EOF

Once enabled, all system logs from journalctl and auditd are collected. Use the controls below to apply filters.

Auditd logs are produced by the auditd daemon and contains security related information. The service might not be installed by default on your Linux. To install auditd from your distribution:

For Ubuntu/Debian:

Terminal window
sudo apt-get install auditd

For Fedora, CentOS, Almalinux, RockyLinux or similar:

Terminal window
sudo yum install audit

Filters can also be applied globally with global filters.

For example, to only keep logs from a specific program:

log.opentelemetry.global_filters:
include:
match_type: strict
record_attributes:
- key: 'source_program'
value: 'sshd-session'

On most Linux, system logs are produced by journald / journalctl. If your Linux doesn’t have journalctl, you can configure Glouton to collect system logs using /var/log/syslog. Create a configuration file to enable syslog discovery rather than journalctl:

Terminal window
sudo tee /etc/glouton/conf.d/99-logs.conf > /dev/null << 'EOF'
log.opentelemetry.auto_discovery.syslog_enable: true
log.opentelemetry.auto_discovery.journalctl_enable: false
EOF