pflogd is a background daemon which reads packets logged by pf(4) to a
pflog(4) interface, normally pflog0, and writes the packets to a log-
file (normally /var/log/pflog) in tcpdump(1) binary format. These logs
can be reviewed later using the -r option of tcpdump(1), hopefully of-
fline in case there are bugs in the packet parsing code of tcpdump(1).
log /dev/log local2
use-syslog: <yes or no>
Sets Local-unbound to send log messages to the syslogd, using
syslog(3). The log facility LOG_DAEMON is used, with identity
"local-unbound". The logfile setting is overridden when
use-syslog is turned on. The default is to log to syslog.
What exactly do you think those PF logs are? They are not messages, they are binary captures of the actual packets.I would like to send pf logs to syslog-ng
Yes, that's fine. That's why I was asking what you really wanted to log. On their own they are somewhat useless, they look like this (removed my own IP) if you read them with tcpdump(1):I am not very expert I am trying to learn
10:10:36.557660 IP 165.22.221.215.34452 > a.b.c.d.22: Flags [S], seq 1420336892, win 64240, options [mss 1460, [|tcp]
May 27 10:10:20 maelcum sshguard[2283]: Attack from "165.22.221.215" on service SSH with danger 10.
May 27 10:10:20 maelcum sshguard[2283]: Blocking "165.22.221.215/32" for 120 secs (5 attacks in 15 secs, after 1 abuses over 15 secs.)