# # Sample Swatch Rules # # These Swatch rules are tailored to flag ssh syslog # entries in various colours depending on the severity. # # Copyright 2001, Bri Hatch # Released under the GPL. # Some patterns to ignore ignore = /log: Server listening on port \d+$/ ignore = /log: Connection from .* port \d+$/ ignore = /log: Generating new \d+ bit RSA key.$/ ignore = /log: RSA key generation complete.$/ ignore = /log: .* authentication for .* accepted.$/ ignore = /log: Closing connection to/ ignore = /fatal: Read error from remote host/ ignore = /fatal: Connection closed by remote/ ignore = /log: Wrong response to RSA authentication challenge./ ignore = /fatal: Read from socket failed: Connection timed out./ # Highlight root logins we expect watchfor = /log: ROOT LOGIN as 'root' from trusted.example.com/ echo magenta # Warn big time for root logins we aren't expecting watchfor = /log: ROOT LOGIN/ echo magenta_h bell 2 mail root@localhost:reegen@localhost,subject=ROOT LOGIN ALERT write root:reegen exec /opt/bin/page_admins $0 # Forward/reverse mapping errors watchfor = /POSSIBLE BREAKIN ATTEMPT!/ echo red watchfor = /fatal:/ echo blue # Make sure anything we don't explicitly ignore is logged in # unobtrusive green. As we find new things that are important # we'll make more rules for them. watchfor = /.*/ echo green