Skip to content

ownCloud log file decoder and rules for OSSEC (Open Source SECurity)

License

Notifications You must be signed in to change notification settings

SunboX/ossec-owncloud

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

ownCloud log file decoder and rules for OSSEC (Open Source SECurity)

One of the main features of OSSEC is monitoring system and application logs. This repository covers the decoder and rules for a ownCloud service.

HowTo Use

To add the owncloud.log file to the configuration for monitoring is simple. In the system’s /var/ossec/etc/ossec.conf on your server add an entry like this:

<ossec_config>

  <!-- .... -->

  <localfile>
    <log_format>syslog</log_format>
    <location>/var/www/PATH_TO_YOUR_OWNCLOUD_INSTALL/data/owncloud.log</location>
  </localfile>
</ossec_config>

Now add the compiler from ossec/etc/local_decoder.xml to your /var/ossec/etc/local_decoder.xml file on your server. If it doesn't exist, create it. This one will parse your owncloud.log so you can apply the rules.

Now copy the rules from ossec/rules/owncloud_rules.xml to /var/ossec/rules/owncloud_rules.xml on your server.

Last thing is to load these newly added rules. Open the system’s /var/ossec/etc/ossec.conf on your server again and add an entry like this:

<ossec_config>
  
  <!-- .... -->
  
  <rules>
  
    <!-- .... -->
  
    <include>owncloud_rules.xml</include>
  </rules>
</ossec_config>

Only thing left is to reload your ossec:

$ sudo /var/ossec/bin/ossec-control restart

For active-respons to work, IP addresses of failed login attempts must be logged by ownCloud. Set "log_authfailip” => true," in your ownCloud configuration file.

About

ownCloud log file decoder and rules for OSSEC (Open Source SECurity)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published