syslog-ng-redis_slave.conf 1.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. @version: 3.38
  2. @include "scl.conf"
  3. options {
  4. chain_hostnames(off);
  5. flush_lines(0);
  6. use_dns(no);
  7. dns_cache(no);
  8. use_fqdn(no);
  9. owner("root"); group("adm"); perm(0640);
  10. stats_freq(0);
  11. bad_hostname("^gconfd$");
  12. };
  13. source s_src {
  14. unix-stream("/dev/log");
  15. internal();
  16. };
  17. destination d_stdout { pipe("/dev/stdout"); };
  18. destination d_redis_ui_log {
  19. redis(
  20. host("`REDIS_SLAVEOF_IP`")
  21. persist-name("redis1")
  22. port(`REDIS_SLAVEOF_PORT`)
  23. auth("`REDISPASS`")
  24. command("LPUSH" "POSTFIX_MAILLOG" "$(format-json time=\"$S_UNIXTIME\" priority=\"$PRIORITY\" program=\"$PROGRAM\" message=\"$MESSAGE\")\n")
  25. );
  26. };
  27. destination d_redis_f2b_channel {
  28. redis(
  29. host("`REDIS_SLAVEOF_IP`")
  30. persist-name("redis2")
  31. port(`REDIS_SLAVEOF_PORT`)
  32. auth("`REDISPASS`")
  33. command("PUBLISH" "F2B_CHANNEL" "$(sanitize $MESSAGE)")
  34. );
  35. };
  36. filter f_mail { facility(mail); };
  37. # start
  38. # overriding warnings are still displayed when the entrypoint runs its initial check
  39. # warnings logged by postfix-mailcow to syslog are hidden to reduce repeating msgs
  40. # Some other warnings are ignored
  41. filter f_ignore {
  42. not match("overriding earlier entry" value("MESSAGE"));
  43. not match("TLS SNI from checks.mailcow.email" value("MESSAGE"));
  44. not match("no SASL support" value("MESSAGE"));
  45. not facility (local0, local1, local2, local3, local4, local5, local6, local7);
  46. };
  47. # end
  48. log {
  49. source(s_src);
  50. filter(f_ignore);
  51. destination(d_stdout);
  52. filter(f_mail);
  53. destination(d_redis_ui_log);
  54. destination(d_redis_f2b_channel);
  55. };