从日志入手,把“事后查看”升级为“持续监测 + 快速响应”的闭环,可显著降低被入侵与数据泄露的风险。下面给出在 Debian 上基于 Tomcat 日志的安全提升方案。
一 日志基础与关键文件
二 收集 轮转 与 权限 的基础防护
/opt/tomcat/logs/catalina.out {
daily
rotate 30
compress
missingok
notifempty
copytruncate
}
sudo chown -R tomcat:tomcat /opt/tomcat/logs
sudo chmod -R 640 /opt/tomcat/logs/*.log
三 日志分析与异常检测实战
tail -f /opt/tomcat/logs/catalina.out | egrep -i "error|exception|fail"
less /opt/tomcat/logs/localhost_access_log.2025-09-23.txt
awk '$9 == 404 {print $1}' /opt/tomcat/logs/localhost_access_log.2025-09-23.txt \
| sort | uniq -c | sort -nr | head
grep -E "(union.*select|from\s+information_schema|and\s+1=1)" \
/opt/tomcat/logs/localhost_access_log.*.txt
grep -i "script|onerror=alert\(|eval\(|base64_decode\(" \
/opt/tomcat/logs/localhost_access_log.*.txt
grep -E "(/etc/passwd|\.bak|WEB-INF/config\.properties|\.jsp)" \
/opt/tomcat/logs/localhost_access_log.*.txt
四 告警响应与联动加固
sudo iptables -A INPUT -s <suspicious_ip> -j DROP
<Host name="localhost" appBase="webapps"
unpackWARs="true" autoDeploy="false" deployOnStartup="false">
五 30 天落地清单
以上流程将日志从“被动记录”转化为“主动防御”的核心数据来源,配合最小化配置与访问控制,可在 Debian 上显著提升 Tomcat 的安全水位。