This is a typical report you would receive from Epylog. All names changed to protect the innocent and make fun of the guilty. :)

monitor.dept.duke.edu

First event: Mon Apr 21 09:59:46 2003
Last event: Mon Apr 21 11:00:01 2003

The "First event" and the "Last event" are calculated based upon the timestamps found in the logs. If your machines have skewed clocks, there will be skewed results here.

Logins

ROOT Login FAILURES

stool ssh2(pw) @dsl-addr.atlnga1.dsl-verizon.net(1)

ROOT Logins

rubeus su ivon(1)
stool ssh2(pw) @dsl-addr.atlnga1.dsl-verizon.net(1)
The logins report goes first by default. As you can see here, root logins and root failures are listed namely. The first column is the name of the system to which root hath logged in. The second column is the login method, and the third column is user@remotehost. If remotehost is N/A, then only the username is displayed. If the username is not available, well, then it's omitted.

User Failures

cburger imapd mail(1)
mstoner ssh2(rsa) tickleme(1)
mmilner gdm baraddur5(1)
esperalto IMP2 imap.dept.duke.edu(1)

User Logins

amd2000 IMP2 mail.dept.duke.edu(1)
  imapd mail(10)
bananj imapd mail(58)
bclamsy imapd mail(1)
beenjammin imapd mail(9), mail::dsl-addr.dsl.speakeasy.net(6)
brok imapd mail(2)
capten gdm neutrino(1)
nyc3 ssh2(pw) panic0(1)
hsgeez ssh2(pw) bheema::192.168.160.120(1)
ivon gdm rubeus(1)
  imapd mail(7)
This is the list of users logging in and failing to do so. You will notice that some entries have a hostname in red -- there is an option for the logins module where you can specify which domains are "trusted." E.g. this run was with "duke.edu" set as a trusted domain, so anyone logging in from a remote host not matching "duke.edu" will get their remote hostname highlighted in red.

Packet Filter

Firewall Violations

242 192.168.216.160 [126 hosts] [2] SkyDance (4000/tcp)
123 192.168.84.66 ipsurf LDROP [123 ports]
3 addy.mi.hypervine.net softice LDROP http (80/tcp)
2 dhcp19.dept.duke.edu wtf4 REJECT 44515/udp
2 dhcp19.dept.duke.edu wtf2 REJECT 44515/udp
2 addy1.ns.aol.com ipsurf LDROP 35410/udp
1 addy2.ns.aol.com ipsurf LDROP RemoConChubo (81/tcp)
This is a firewall report. The firewall module will happily process ipchains, iptables, and ipfilter reports, though they might require some configuration. The columns go like this: number of packets, offending remote host, reporting victim host, log method, and the port on which the violation has occurred. If there are more than 10 hosts hit, or more than 10 ports probed, the logins module will collapse the report nicely, so it's not a kilometer long. If you don't like the number 10, you can set a different one in the logins module config file. If the module detects that the probe occurred on a port commonly running a trojan, the name will be highlighted in red. The trojan list is found in /etc/epylog/trojans.list and can be easily edited, or disabled entirely in the config file for the module.

Mail

General Mail Report

490 Total Messages Processed
769 Total Successful Deliveries
33 Total Warnings Issued
19 Total Bounced Messages
441 Processed by Procmail
3 MB Total Transferred Size

Top 5 active systems

439 mail
10 loginner1
8 loginner2
6 supervova
4 ipsurf

Top 5 connecting hosts

26 listman.redhat.com
16 192.168.177.110
12 addy.swfla.rr.com
10 loginner1.dept.duke.edu
8 zahn.bigplace.duke.edu

Top 5 senders

48 <mailer-daemon>
29 <addy1@dept.duke.edu>
12 <addy1@redhat.com>
8 <addy2@redhat.com>
8 <addy2@dept.duke.edu>

Top 5 recipients

23 <addy1@dept.duke.edu>
20 <addy2@dept.duke.edu>
20 <addy3@dept.duke.edu>
19 <addy4@dept.duke.edu>
19 <addy5@dept.duke.edu>
This is pretty self-explanatory. The mail module will process entries by sendmail and postfix, with qmail support slated for the near future.

Spamassassin

Total stats

138 users/437 msgs 2 MB 2 min 0.2 (412/25)

Top 10 ranking users

srvidal 92 KB 5 sec -6.6 (19/0)
ivon 91 KB 2 sec -0.9 (18/0)
mpriest 24 KB 4 sec -1.3 (13/0)
zjeigler 46 KB 4 sec -1.2 (12/0)
salsa 25 KB 2 sec 1.0 (11/0)
mstoner 68 KB 1 sec -1.2 (11/0)
sounders 21 KB 1 sec 1.0 (9/1)
btigre 17 KB 4 sec -1.4 (10/0)
martini 14 KB 2 sec -1.3 (9/0)
adidas 14 KB 5 sec -1.4 (9/0)
The spammassassin module is not enabled by default, but is handy to give you some stats about what is going on. The columns go like so: first the username (or totals), then the size of messages processed, total time spent processing, and the mean-average score. The numbers in the parentheses are (under threshold/over threshold). The default spam threshold is 5, but it can be set in the spamd module config file.

Notices

CRITICAL Notices

baraddur5 rebooted with kernel 2.4.18-27.7.x(1)

General Notices

baraddur5 misc CDROM errors(1)
grands-26 Gconf locking errors(1)
grands-28 Gconf locking errors(236)
grands-32 misc CDROM errors(1)
mail ypproc_match denied from mail.dept.duke.edu(345)
wehen0 Gconf locking errors(9)
web ypproc_match denied from monitor.dept.duke.edu(1)
The notices module is a convenience module that will notify you of some alerts or problems. It isn't very configurable at the moment, but there will be an extra config file where custom entries can be added in the short run (before 1.0). As you can see, gconfd is still the smelliest piece of crap under the sun. :)

Weedeater

Total messages weeded: 9212

The weeder module makes sure that crap you don't care to know about doesn't land in the unparsed strings. This helps to lessen the size of the report dramatically. Filtered strings are configurable -- see more in the weeder.conf file.

Unparsed Strings:

Apr 21 10:26:54 panic0/panic0 sshd[4795]: Received disconnect from 192.168.232.146: 11: Disconnect requested by Windows SSH Client.
Apr 21 10:31:29 baraddur5/baraddur5 sshd[1051]: Server listening on 0.0.0.0 port 22.
[...skipped...]
Apr 21 10:55:33 rubeus/rubeus kernel: nfs: server hawking not responding, still trying
Apr 21 10:55:33 rubeus/rubeus kernel: nfs: server hawking OK
      
Lastly, the strings that didn't match anything are appended. This can be turned off, but not recommended -- usually these would be very useful.

Brought to you by epylog-0.9.0-1

A little bit of self-promotion goes a long way. :)