From fc208155aabf52504000057808af54186a886bad Mon Sep 17 00:00:00 2001 From: Rainer Gerhards Date: Mon, 23 Jul 2007 10:36:29 +0000 Subject: added $DropTrailingLFOnReception config directive --- doc/rsyslog_conf.html | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/doc/rsyslog_conf.html b/doc/rsyslog_conf.html index bf30c681..37300a5e 100644 --- a/doc/rsyslog_conf.html +++ b/doc/rsyslog_conf.html @@ -160,6 +160,14 @@ here is set to "on", the malicious message will be completely dropped logs. If the option is set to "off", the message will be logged, but the original IP will be used instead of the DNS name.

$DropMsgsWithMaliciousDnsPTRRecords on

+

DropTrailingLFOnReception

+

Syslog messages frequently have the line feed character (LF) as the last +character of the message. In allmost all cases, this LF should not really become +part of the message. However, recent IETF syslog standardization recommends +against modifying syslog messages (e.g. to keep digital signatures valid). This +option allows to specify if trailing LFs should be dropped or not. The default +is to drop them, which is consistent with what sysklogd does. To drop them, use

+

$DropTrailingLFOnRecption off

ControlCharacterEscapePrefix

This option specifies the prefix character to be used for control character escaping (see option $EscapeControlCharactersOnReceive). By default, it is '\', -- cgit v1.2.3