Information
Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead to a delayed or incomplete analysis of an ongoing attack.
The content captured in audit records must be managed from a central location (necessitating automation). Centralized management of audit records and logs provides for efficiency in maintenance and management of records, as well as the backup and archiving of those records.
VMware Postgres is capable of outputting directly to syslog but for performance reasons, the vCenter Server Appliance (VCSA) is configured to ship logs centrally via 'rsyslog' file monitoring. To facilitate that configuration, log files must be generated to disk.
Satisfies: SRG-APP-000356-DB-000314, SRG-APP-000356-DB-000315, SRG-APP-000092-DB-000208, SRG-APP-000381-DB-000361, SRG-APP-000495-DB-000326, SRG-APP-000495-DB-000327, SRG-APP-000495-DB-000328, SRG-APP-000495-DB-000329, SRG-APP-000496-DB-000334, SRG-APP-000496-DB-000335, SRG-APP-000499-DB-000330, SRG-APP-000499-DB-000331, SRG-APP-000501-DB-000336, SRG-APP-000501-DB-000337, SRG-APP-000504-DB-000354, SRG-APP-000504-DB-000355, SRG-APP-000507-DB-000356, SRG-APP-000507-DB-000357, SRG-APP-000508-DB-000358
Solution
At the command prompt, run the following commands:
# /opt/vmware/vpostgres/current/bin/psql -U postgres -c 'ALTER SYSTEM SET logging_collector TO 'on';'
# /opt/vmware/vpostgres/current/bin/psql -U postgres -c 'SELECT pg_reload_conf();'
Item Details
Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT
References: 800-53|AU-3(2), 800-53|AU-12c., 800-53|AU-14(1), 800-53|CM-5(1), CAT|II, CCI|CCI-000172, CCI|CCI-001464, CCI|CCI-001814, CCI|CCI-001844, Rule-ID|SV-256607r887607_rule, STIG-ID|VCPG-70-000017, Vuln-ID|V-256607
Control ID: 6d6ca65bbb8232e80c6a4d96fa05c6fd2961748a6e622aabe99d85ec02ddee99