Open the /etc/rsyslog.conf file for syslog configuration in fedora Linux (some linux like CentOS has /etc/syslog.conf). It will show the something similar as given below:
| # Log all kernel messages to the console. |
| # Logging much else clutters up the screen. |
| #kern.* /dev/console |
| # Log anything (except mail) of level info or higher. |
| # Don’t log private authentication messages! |
| *.info;mail.none;authpriv.none;cron.none /var/log/messages |
| # The authpriv file has restricted access. |
| authpriv.* /var/log/secure |
| # Log all the mail messages in one place. |
| mail.* -/var/log/maillog |
| # Log cron stuff |
| cron.* /var/log/cron |
| # Everybody gets emergency messages |
| *.emerg * |
| # Save news errors of level crit and higher in a special file. |
| uucp,news.crit /var/log/spooler |
| # Save boot messages also to boot.log |
| local7.* /var/log/boot.log |
Add a new line in this file, as follows:
| # root will gets login failure messages on its terminal |
| authpriv.warning root |
You can also add multiple users with comma separated like
| # root will gets login failure messages on its terminal |
| authpriv.warning root,Rahul |
After doing the changes on syslog configuration file, restart the syslog service by following command.
| # service rsyslog start |
Now you can get the live information directly on your terminal, if someone trying to do a password attack.


Pingback: Configure syslog to print the Security violation alarm on user terminal (via Linux Explore) « Linux Explore
Pingback: Configure syslog to print the Security violation alarm on user terminal (via Linux Explore) | Linux Explore