Other Articles

Servers – Ensure Logging is Configured

Support > Fixing Checks > Server

06 March, 2026

This check ensures that logging is properly configured on the server for security monitoring.

Proper logging helps track system activities, detect suspicious behavior, and supports auditing and compliance requirements.

Check Details

  • Resource: Server
  • Check: Ensure logging is configured
  • Risk: Missing or misconfigured logging can lead to lack of visibility into security events and failed audit compliance.

Remediation Steps

  1. Open a terminal session with root or sudo privileges.
  2. Identify the logging agent being used on the system:
    • Stackdriver Logging
    • Fluent Bit
  3. For Stackdriver Logging, edit configuration files:

    sudo nano /etc/stackdriver/logging.config.d/*.conf
    
  4. Ensure appropriate logging rules are defined based on your environment.
  5. For Fluent Bit, edit configuration file:

    sudo nano /usr/share/fluent-bit/fluent-bit.conf
    
  6. Update logging inputs, outputs, and filters as required.
  7. Restart logging service to apply changes:

    For Stackdriver:

    sudo systemctl restart stackdriver-logging
    

    For Fluent Bit:

    sudo systemctl restart fluent-bit
    
  8. Verify that logs are being generated:

    ls -l /var/log/
    
  9. Ensure logs contain relevant system and security events.