From mboxrd@z Thu Jan 1 00:00:00 1970 From: Jakub Wartak Subject: Re: packets loging Date: Sat, 22 Apr 2006 15:47:31 +0200 Message-ID: <200604221547.31612.vnulllists@pcnet.com.pl> References: <002d01c66445$01dd28f0$0e01050a@CyberAdmin> Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Return-path: In-Reply-To: <002d01c66445$01dd28f0$0e01050a@CyberAdmin> Content-Disposition: inline List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: netfilter-bounces@lists.netfilter.org Errors-To: netfilter-bounces@lists.netfilter.org Content-Type: text/plain; charset="iso-8859-1" To: netfilter@lists.netfilter.org Dnia czwartek, 20 kwietnia 2006 08:38, robee napisa=B3: > when i use -j LOG target, netfilter writes so many information to syslog. > what can i use to write only IN and OUT interface, SRC and DST host? Get a syslog-ng up && running.=20 Create filter to match only entries you are interested in ( iptables=20 =2D-log-prefix "something-unique" + filter { } definition in syslog-ng.con= f ) Try to catch this "prefix" and direct it into pipe ( you can feed some SQL= =20 backend with it or write small daemon/script that will read this pipe line = by=20 line and extract information that you want to store/you are interested in ). And also try NOT to log netfilter messages info messages/kernel and so on=20 ( performance reasons ). This can be achived by using "not=20 match(somestring)" in log {} section. =2D-=20 Jakub Wartak =2Dvnull Abstrakcyjna plciowosc szczekoczulek Konstantego. http://vnull.pcnet.com.pl/