UCF STIG Viewer Logo

VMware Postgres must be configured to log to stderr.


Overview

Finding ID Version Rule ID IA Controls Severity
V-239213 VCPG-67-000021 SV-239213r679012_rule Medium
Description
Organizations are required to use a central log management system so, under normal conditions, the audit space allocated to the DBMS on its own server will not be an issue. However, space will still be required on the DBMS server for audit records in transit, and, under abnormal conditions, this could fill up. Because a requirement exists to halt processing upon audit failure, a service outage would result. If support personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for storage capacity expansion. The appropriate support staff include, at a minimum, the ISSO and the DBA/SA. Satisfies: SRG-APP-000359-DB-000319, SRG-APP-000515-DB-000318
STIG Date
VMware vSphere 6.7 PostgreSQL Security Technical Implementation Guide 2021-03-18

Details

Check Text ( C-42446r679010_chk )
At the command prompt, execute the following command:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SHOW log_destination;"|sed -n 3p|sed -e 's/^[ ]*//'

Expected result:

stderr

If the output does not match the expected result, this is a finding.
Fix Text (F-42405r679011_fix)
At the command prompt, execute the following commands:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_destination TO 'stderr';"

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"