Name: puppet-rsyslog
Owner: Vox Pupuli
Description: Puppet module for managing rsyslog
Created: 2016-04-13 15:02:27.0
Updated: 2018-05-23 14:44:57.0
Pushed: 2018-05-23 14:44:55.0
Homepage: null
Size: 270
Language: Ruby
GitHub Committers
User | Most Recent Commit | # Commits |
---|
Other Committers
User | Most Recent Commit | # Commits |
---|
This module was first published as crayfishx/rsyslog
. It has now moved to puppet/rsyslog
and is managed by the community group Vox Pupuli.
This module manages the rsyslog server and client configuration. It supports rsyslog v8 and defaults to configuring most things in the newer rainerscript configuration style. Where possible, common configuration patterns have been abstracted so they can be defined in a structured way from hiera. Though there are a lot of customization options with the configuration, highly complex rsyslog configurations are not easily represented in simple data structures and in these circumstances you may have to provide raw rainerscript code to acheive what you need. However, the aim of this module is to abstract as much as possible.
This module is only compatible with Puppet 4.0.0+
Simply include the rsyslog::client
or rsyslog::server
class
s { 'rsyslog::server': }
Configures base rsyslog packages, service and general configuration
Configuration directives for a server
Configuration directives for a client
Configuration options should be configured in Hiera. Defaults are defined in data/common.yaml within the module
rsyslog::confdir
Specifies the main directory where the module will place all configuration files (default: rsyslogd)
rsyslog::package_name
The package to install (default: rsyslog)
rsyslog::package_version
Package version/state to install, (default: installed)
rsyslog::feature_packages
An array containing a list of extra packages (features) to install.
rsyslog::manage_package
Enable or disable managing the package (default: true)
rsyslog::manage_confdir
Enable or disable managing the configuration directory (confdir) (default: true)
rsyslog::purge_config_files
When rsyslog::manage_confdir
is set to true, this option defines whether or not to purge unmanaged files within the configuration directory (default: true)
rsyslog::config_file
Location of rsyslog main configuration file (default: /etc/rsyslog.conf)
rsyslog::override_default_config
When set to true, the default configuration file is overridden with just an include statement to the configuration directory .d (default: true)
rsyslog::manage_service
Manage the service or not (default: true)
rsyslog::service_name
Name of the service (default: rsyslog)
rsyslog::service_status
State of the service (default: running)
rsyslog::service_enabled
Whether or not to enable the service (default: true)
rsyslog::external_service
Whether or not to use an external service, be it managed by another module (such as a container service managed by garethr-docker
) or unmanaged. MUST be used with rsyslog::service_name
and cannot be used with rsyslog::manage_service
. (default: false)
By default, everything is configured in a single file under $confdir
called 50_rsyslog.conf. This means that packages and other OS specific configurations can also be included (see purge_config_files above). The default file can be changed using the rsyslog::target_file
directive and is relative to the confdir.
eg:
log::target_file: 50_rsyslog.conf
You can, however, define custom confdirs and/or custom paths for configuration files. All configuration options have the following global options you can add to their hiera keys:
priority
- Order in the file to place the config value relative to the other config options in the file. Takes an integer. Defaults to the priority set for the configuration type. See Ordering for more.target
- Target file to place the config values in. Defaults to 50_rsyslog.conf in the default $confdir
.confdir
- Target configuration directory. Defaults to /etc/rsyslog.d
.The following configuration parameters are defaults for the order of configuration object types within the configuration file. They can be overriden for individual object definitions (see configuring objects below)
efault object type priorities (can be overridden)
log::global_config_priority: 10
log::module_load_priority: 20
log::input_priority: 30
log::main_queue_priority: 40
log::parser_priority: 45
log::template_priority: 50
log::filter_priority: 55
log::action_priority: 60
log::ruleset_priority: 65
log::lookup_table_priority: 70
log::legacy_config_priority: 80
log::custom_priority: 90
Ordering is done numerically. I.E. 111 is after 110 is after 99.
Configuration objects are written to the configuration file in rainerscript format and can be configured in a more abstract way directly from Hiera. The following configuration object types are supported
Configuration objects should be declared in the rsyslog::server or rsyslog::client namespaces accordingly.
rsyslog::server::modules
A hash of hashes, hash key represents the module name and accepts a hash with values or an empty hash as its value. The hash accepts the following three values:
type
: values can be external or builtin
the default value is external and need not be specified explicitly.config
: its a hash which provides optional parameters to the module loaded.priority
: The module load order can be priortised based on the optional priority
value.eg:
log::server::modules:
uxsock: {}
udp:
config:
threads: "2"
TimeRequery: "8"
batchSize: "128"
usrmsg:
type: "builtin"
file:
type: "builtin"
config:
fileOwner: "syslog"
fileGroup: "adm"
dirGroup: "adm"
fileCreateMode: "0640"
dirCreateMode: "0755"
pstats:
type: "external"
priority: 29
config:
interval: "60"
severity: "7"
log.syslog: "off"
log.file: "/var/log/rsyslog/logs/stats/stats.log"
Ruleset: "remote"
will produce
le (load="imuxsock")
le (load="imudp"
threads="2"
TimeRequery="8"
batchSize="128"
le (load="builtin:omusrmsg")
le (load="builtin:omfile"
fileOwner="syslog"
fileGroup="adm"
dirGroup="adm"
fileCreateMode="0640"
dirCreateMode="0755"
le (load="impstats"
interval="60"
severity="7"
log.syslog="off"
log.file="/var/log/rsyslog/logs/stats/stats.log"
Ruleset="remote"
rsyslog::server::global_config
rsyslog::client::global_config
A hash of hashes, they key represents the configuration setting and the value is a hash with the following keys:
value
: the value of the settingtype
: the type of format to use (legacy or rainerscript), if omitted rainerscript is used.eg:
log::server::global_config:
ask:
value: '0000'
type: legacy
priority: 01
peatedMsgReduction:
value: 'on'
type: legacy
ivDropToUser:
value: 'syslog'
type: legacy
ivDropToGroup:
value: 'syslog'
type: legacy
rser.escapeControlCharactersOnReceive:
value: 'on'
rkDirectory:
value: '/var/spool/rsyslog'
xMessageSize:
value: '64k'
will produce
sk 0000
vDropToGroup syslog
vDropToUser syslog
eatedMsgReduction on
al (
parser.escapeControlCharactersOnReceive="on"
workDirectory="/var/spool/rsyslog"
maxMessageSize="64k"
rsyslog::server::main_queue_opts
Configures the main_queue
object in rsyslog as a hash. eg:
log::server::main_queue_opts:
eue.maxdiskspace: 1000G
eue.dequeuebatchsize: 1000
will produce
_queue(
eue.maxdiskspace="1000G"
eue.dequeuebatchsize="1000"
rsyslog::server::templates
Configures template
objects in rsyslog. Each element is a hash containing the name of the template, the type and the template data. The type parameter can be one of string
, subtree
, plugin
or list
eg:
log::server::templates:
mote:
type: string
string: "/var/log/rsyslog/logs/%fromhost-ip%/%fromhost-ip%.log"
l2:
type: subtree
subtree: "$1!$usr"
meplug:
type: plugin
plugin: foobar
will produce
late (name="remote" type="string"
ring="/var/log/rsyslog/logs/%fromhost-ip%/%fromhost-ip%.log"
When using list
, the list_descriptions
hash should contain an array of single element hashes, the key should be constant
or property
with their corresponding parameters in a sub hash.
eg:
ain-syslog:
type: list
list_descriptions:
- constant:
value: '{'
- constant:
value: '\"@timestamp\":\"'
- property:
name: timereported
dateFormat: rfc3339
- constant:
value: '\",\"host\":\"'
- property:
name: hostname
- constant:
value: '\",\"severity\":\"'
- property:
name: syslogseverity-text
- constant:
value: '\",\"facility\":\"'
- property:
name: syslogfacility-text
- constant:
value: '\",\"tag\":\"'
- property:
name: syslogtag
format: json
- constant:
value: '\",\"message\":\"'
- property:
name: msg
format: json
- constant:
value: '\"}'
will produce
late (name="plain-syslog" type="list"
constant(value="{" )
constant(value="\"@timestamp\":\"" )
property(name="timereported" dateFormat="rfc3339" )
constant(value="\",\"host\":\"" )
property(name="hostname" )
constant(value="\",\"severity\":\"" )
property(name="syslogseverity-text" )
constant(value="\",\"facility\":\"" )
property(name="syslogfacility-text" )
constant(value="\",\"tag\":\"" )
property(name="syslogtag" format="json" )
constant(value="\",\"message\":\"" )
property(name="msg" format="json" )
constant(value="\"}" )
rsyslog::server::actions
rsyslog::client::actions
Configures action objects in rainerscript. Each element of the hash contains the type of action, followed by a hash of configuration options. It also accepts an optional facility parameter and the content is formatted based on the no of config options passed and if the facility option is present.
eg:
log::server::actions:
l_logs:
type: omfile
facility: "*.*;auth,authpriv.none"
config:
dynaFile: "remoteSyslog"
specifics: "/var/log/test"
rn_logs:
type: omfile
facility: "kern.*"
config:
dynaFile: "remoteSyslog"
file: "/var/log/kern.log"
cmd: "/proc/cmdline"
asticsearch:
type: omelasticsearch
config:
queue.type: "linkedlist"
queue.spoolDirectory: /var/log/rsyslog/queue
will produce
e: There is only 2 options passed so formats in a single line.
l_logs
auth,authpriv.none action(type="omfile" dynaFile="remoteSyslog" specifics="/var/log/test" )
e: There is more than 2 options passed so formats into multi line with facility.
rn_logs
.* action(type="omfile"
dynaFile="remoteSyslog"
file="/var/log/kern.log"
cmd="/proc/cmdline"
)
e: There is no facility option passed so formats it without facility.
on(type="omelasticsearch"
eue.type="linkedlist"
eue.spoolDirectory="/var/log/rsyslog/queue"
rsyslog::server::inputs
rsyslog::client::inputs
Configures input objects in rainerscript. Each element of the hash contains the type of input, followed by a hash of configuration options. Eg:
log::server::inputs:
udp:
type: imudp
config:
port: '514'
will produce
t(type="imudp"
rt="514"
rsyslog::server::lookup_tables
Configures lookup_tables objects in rainerscript AND generates the JSON lookup_table file. Each key of the hash contains the name of the lookup/lookup_table.
The elements of the hash contain a json
hash containing the values for the JSON file, a lookup_file element that is the path to where the JSON file will be stored,
and a reload_on_hup boolean.
The json hash contains 4 elements: version
, nolookup
, type
, and table
. They MUST be specified in this order as per the
lookup_tables documentation:
version
- Integer denoting the version/revision of the lookup_table file.nolookup
- String denoting what should be returned if a lookup doesn't find a match in the table.type
- Enumerable denoting the type of lookup table. This can be string
, array
, or sparseArray
.table
- An Array of hashes containing the table index and value for each lookup.log::server::lookup_tables:
_lookup:
lookup_json:
version: 1
nolookup: 'unk'
type: 'string'
table:
- index: '1.1.1.1'
value: 'AB'
- index: '2.2.2.2'
value: 'CD'
lookup_file: '/etc/rsyslog.d/tables/ip_lookup.json'
reload_on_hup: true
will produce
tc/rsyslog.d/tables/ip_lookup.json
ersion": 1,
omatch": "unk",
ype": "string",
able": [
{
"index": "1.1.1.1",
"value": "A"
},
{
"index": "2.2.2.2",
"value": "B"
}
and
up_table(name="ip_lookup" file="/etc/rsyslog.d/tables/ip_lookup.json" reloadOnHUP="on")
NOTE: This does not create the actual lookup()
call in the Rsyslog configuration file(s). Currently that is only supported via
the rsyslog::server::custom_config
and rsyslog::client::custom_config
resources as it requires setting rsyslog variables (I.E. - set $.iplook = lookup('ip_lookup', $hostname)
).
rsyslog::server::parser
Configures parser objects in rainerscript. Each Element of the hash contains the type of parser, followed by a hash of configuration options. Eg:
log::server::parser:
rfc3164_hostname_with_slashes:
type: pmrfc3164
config:
permit.slashesinhostname: 'on'
will produce
er(name="pmrfc3164_hostname_with_slashes"
type="pmrfc3164"
permit.slashesinhostname="on"
rsyslog::server::rulesets
Configures Rsyslog ruleset blocks in rainerscript. There are two elements in the rulesets hash:
parameters
- settings to pass to the ruleset determining things such as which rsyslog parser to use or the ruleset's queue size.rules
- the actual content that goes inside the ruleset. Currently the following are supported:action
- rsyslog actions defined inside of the ruleset.lookup
- Sets a variable to the results of an rsyslog lookup.set
- Set an rsyslog variablecall
- call a specific action.expression_filter
- Filter based on one or more expressions.property_filter
- Filter based on one or more RsyslogD properties.stop
- a Boolean to set if the ruleset ends with a stop or not.NOTE: For any rule
key that can also be a standalone rsyslog resource (action
, expression_filter
, or property_filter
), the user MUST define a name key that will be passed as the resource name to the template. This will be simplified in a future release.
log::server::rulesets:
leset_eth0_514_tcp:
parameters:
parser: pmrfc3164.hostname_with_slashes
queue.size: '10000'
rules:
- set:
rcv_time: 'exec_template("s_rcv_time")'
- set:
utime_gen: 'exec_template("s_unixtime_generated")'
- set:
uuid: '$uuid'
- action:
name: utf8-fix
type: mmutf8fix
- action:
name: test-action
type: omfile
facility: "*.*;auth,authpriv.none"
config:
dynaFile: "remoteSyslog"
specifics: "/var/log/test"
- action:
name: test-action2
type: omfile
config:
dynaFile: "remoteSyslog"
specifics: "/var/log/test"
- lookup:
var: srv
lookup_table: srv-map
expr: '$fromhost-ip'
- call: 'action.parse.rawmsg'
- call: 'action.parse.r_msg'
stop: true
Will produce:
set (name="ruleset_eth0_514_tcp"
rser="pmrfc3164.hostname_with_slashes"
eue.size="10000"
t $.rcv_time = exec_template("s_rcv_time");
t $.utime_gen = exec_template("s_unixtime_generated");
t $.uuid = $uuid;
utf8-fix action
tion(type="mmutf8fix"
name="utf8-fix"
test-action action
auth,authpriv.none action(type="omfile"
name="test-action"
dynaFile="remoteSyslog"
specifics="/var/log/test"
)
test-action2 action
tion(type="omfile"
name="test-action2"
dynaFile="remoteSyslog"
specifics="/var/log/test"
t $.srv = lookup("srv-map", $fromhost-ip);
ll action.parse.rawmsg
ll action.parse.r_msg
op
Rulesets can also contain filtering logic for calling other rulesets, setting other variables, or even dropping logs based on specific values. Filtering logic is required to utilize lookup_tables
and lookup
calls.
Rsyslog puppet supports two kinds of filters:
expression_filter
property_filter
More information about Rsyslog Filters can be found at: http://www.rsyslog.com/doc/v8-stable/configuration/filters.html
Expression filters use traditional if/else
and if/else if/else
logic to execute rules on specific return values. lookup_tables
are compatible ONLY with expression_filters
The Ruleset expression_filter
key has a few different keys than the rsyslog::server::expression_filters
parameter:
name
- Currently required to prevent errors. This is logical and only used by Puppet.filter
- The filter
key is synonymous with the conditionals
key found in the rsyslog::server::expression_filters
parameter. See the Expression Filter Docs for more info.Example:
log::server::rulesets:
leset_eth0_514_udp:
parameters:
queue.type: LinkedList
rules:
- expression_filter:
if:
expression: '$fromhost-ip == "192.168.255.1"'
tasks:
- call: "ruleset.action.rawlog.standard"
- stop: true
- call: "ruleset.client.log.standard"
- call: "ruleset.unknown.standard"
stop: true
will produce:
set (name="ruleset_eth0_514_tcp"
eue.type="LinkedList"
$fromhost-ip == "192.168.255.1" then {
call ruleset.action.rawlog.standard
stop
ll ruleset.client.log.standard
ll ruleset.unknown.standard
op
Example with lookup:
log::server::lookup_tables:
v-map:
lookup_json:
version: 1
nolookup: 'unk'
type: 'string'
table:
- index: '192.168.255.10'
value: 'windows'
- index: '192.168.255.11'
value: 'windows'
- index: '192.168.255.12'
value: 'linux'
lookup_file: '/etc/rsyslog.d/tables/srv-map.json'
reload_on_hup: true
log::server::rulesets:
leset_lookup_set_windows_by_ip:
rules:
- lookup:
var: srv
lookup_table: srv-map
expr: '$fromhost-ip'
- expression_filter:
if:
expression: '$.srv == "windows"'
tasks:
- call: "ruleset.action.forward.windows"
- stop: true
"else if":
expression: '$.srv == "unk"'
tasks:
- call: "ruleset.action.drop.unknown"
- stop: true
else:
tasks:
- stop: true
stop: true
Will produce:
c/rsyslog.d/tables/srv-map.json
ersion": 1,
omatch": "unk",
ype": "string",
able": [
{
"index": "192.168.255.10",
"value": "windows"
},
{
"index": "192.168.255.11",
"value": "windows"
},
{
"index": "192.168.255.12",
"value": "linux"
}
slog.conf
up_table(name="srv-map" file="/etc/rsyslog.d/tables/srv-map.json" reloadOnHUP=on)
set(name="ruleset_lookup_set_windows_by_ip"
t $.srv = lookup("srv-map", $fromhost-ip);
($.srv == "windows") then {
call ruleset.action.forward.windows
stop
else if ($.srv == "unk") then {
call ruleset.action.drop.unknown
stop
else {
stop
property_filters
are unique to rsyslogd. They allow to filter on any property, like HOSTNAME, syslogtag and msg. property_filters
are faster than expression_filters
as they us built-in rsyslog properties to lookup and match data.
Example:
log::server::rulesets:
leset_msg_check_for_error:
rules:
- property_filter:
property: 'msg'
operator: 'contains'
value: 'error'
tasks:
- call: 'ruleset.action.error'
- stop: true
Will Generate:
slog.conf
set(name="ruleset_msg_check_for_error"
sg, contains, "informational" {
call ruleset.action.error
stop
rsyslog::server::property_filters
rsyslog::server::expression_filters
Rsyslog has the ability to filter each log line based on log properties and/or variables.
There are four kinds of filters in Rsyslog:
This section covers Property and Expression based filters.
Property-based filters are unique to rsyslogd. They allow to filter on any property, like HOSTNAME, syslogtag and msg. Property-based filters are only supported with native properties in Rsyslog. See Rsyslog Properties for a list of supported properties.
The rsyslog::server::property_filters
parameter is a Hash of hashes where the hash-key is the logical name for the filter. This name is for Puppet resource naming purposes only and has no other function. The filter name has several additional child keys as well:
property
- the Rsyslogd property the filter will lookup.operator
- the Rsyslogd property filter-supported operator to compare the property value with the expected value. See Rsyslog Property Compare-Operations for a list of supported operators. These operators are validated with the Rsyslog::PropertyOperator
data type.value
- the value that the property filter will match against.tasks
- A hash of actions to take in the event of a filter match.tasks
hash maps to another rsyslog configuration object.eg:
log::server::property_filters:
stname_filter:
property: hostname
operator: contains
value: some_hostname
tasks:
- action:
name: omfile_defaults
type: omfile
facility: "*.*;auth,authpriv.none"
config:
dynaFile: "remoteSyslog"
specifics: "/var/log/test"
- stop: true
_filter:
property: fromhost-ip
operator: startswith
value: '192'
tasks:
- stop: true
will produce
tname, contains, "some_hostname" {
*;auth,authpriv.none action(type="omfile" dynaFile="remoteSyslog" specifics="/var/log/test")
op
mhost-ip, startswith, "192" {
op
Expression-based filters allow filtering on arbitrary complex expressions, which can include boolean, arithmetic and string operations.
Expression-based filters are also what are used to match against lookup_table data.
The rsyslog::server::expression_filters
parameter is a Hash of hashes where the hash-key is the logical name for the filter. This name is for Puppet resource naming purposes only and has no other function. The filter name has a few additional child keys as well:
conditionals
- Hash containing one of three keys (if
, else if
, and else
), which are hashes of hashes.if
/else if
/else
- Hash of hashes. Must be one of if
, else if
, or else
expression
- The string “expression” that will be used to match values. With all the potential options for logic, this was the easiest way to provide everyone with what they may need.tasks
- A hash of actions to take in the event of a filter match.tasks
hash maps to another rsyslog configuration object.eg:
log::server::expression_filters:
stname_filter:
conditionals:
if:
expression: '$msg contains "error"'
tasks:
- action:
name: omfile_error
type: omfile
config:
specifics: /var/log/errlog
will produce
msg contains "error" then {
tion(type="omfile" specifics="/var/log/errlog")
NOTE: Due to the amount of potential options available to the user, the expression
key is a plain text string field and the expression logic must be written out. See next example for more details.
eg:
log::server::expression_filters:
mplex_filter:
if:
expression: '$syslogfacility-text == "local0" and $msg startswith "DEVNAME" and ($msg contains "error1" or $msg contains "error0")'
tasks:
- stop: true
else:
tasks:
- action:
name: error_log
type: omfile
config:
specifics: /var/log/errlog
will produce:
syslogfacility-text == "local0" and $msg startswith "DEVNAME" and ($msg contains "error1" or $msg contains "error0") then {
op
{
tion(type="omfile" specifics="/var/log/errlog")
rsyslog::server::legacy_config
Legacy config support is provided to facilitate backwards compatibility with sysklogd
format as this module mainly supports rainerscript
format.
A hash of hashes, each hash name is used as the comment/reference for the setting and the hash will have the following values:
key
: the key/logger rule settingvalue
: the value/target of the settingtype
: the type of format to use (legacy or sysklogd), if omitted sysklogd is used. If legacy type is used key
can be skipped and one long string can be provided as value.eg:
log::client::legacy_config:
th_priv_rule:
key: "auth,authpriv.*"
value: "/var/log/auth.log"
th_none_rule:
key: "*.*;auth,authpriv.none"
value: "/var/log/syslog"
slog_all_rule:
key: "syslog.*"
value: "/var/log/rsyslog.log"
il_error_rule:
key: "mail.err"
value: "/var/log/mail.err"
ws_critical_rule:
key: "news.crit"
value: "/var/log/news/news.crit"
will produce
th_priv_rule
,authpriv.* /var/log/auth.log
th_none_rule
auth,authpriv.none /var/log/syslog
slog_all_rule
og.* /var/log/rsyslog.log
il_error_rule
.err /var/log/mail.err
ws_critical_rule
.crit /var/log/news/news.crit
legacy type values can be passed as one long string skipping the key parameter like below and you can also override the priority in the hash to rearrange the contents eg:
ergency_rule:
key: "*.emerg"
value: ":omusrmsg:*"
sting_legacy_remotelog:
value: "*.* @@logmonster.cloudfront.net:1514"
type: "legacy"
priority: 12
sting_legacy_rule:
value: "*.* >dbhost,dbname,dbuser,dbpassword;dbtemplate"
type: "legacy"
will produce
ergency_rule
erg :omusrmsg:*
sting_legacy_rule
>dbhost,dbname,dbuser,dbpassword;dbtemplate
sting_legacy_remotelog
@@logmonster.cloudfront.net:1514
All rsyslog object types are positioned according to the default variables (see Ordering). The position can be overridden for any object by adding the optional priority
parameter.
eg:
log::server::actions:
asticsearch:
type: omelasticsearch
config:
queue.type: "linkedlist"
queue.spoolDirectory: "/var/log/rsyslog/queue"
priority: 35
This module attempts to abstract rainerscript objects into data structures that can be handled easily within hiera, however there are clearly times when you need to add some more code structure around an object, such as conditionals. For simple code additions, the template
, action
, input
and global_config
object types support the optional parameter of format
which takes Puppet EPP formatted template as a value, using the variable $content
to signify the object itself. For example, to wrap an action in a simple conditional you could format it as
eg:
log::server::actions:
asticsearch:
type: omelasticsearch
config:
queue.type: "linkedlist"
queue.spoolDirectory: "/var/log/rsyslog/queue"
format: |
if [ $fromhost == "foo.localdomain"] then {
<%= $content %>
}
For more complicated code structures that don't lend themselves well to a structured format, like multiple nested conditionals there is also a special configuration object type called custom_config. custom_config
takes two arguments, priority
to determine where in the file it should be configured, and content
a text string to insert. By default the priority is set by the custom_config_priority
parameter (see Ordering)
log::server::custom_config:
calhost_action:
priority: 45
content: |
if $fromhost == ["foo.localdomain","localhost"] then {
action(type="omfile" file="/var/log/syslog")
} else {
action(type="omelasticsearch"
queue.type="linkedlist"
queue.spoolDirectory="/var/log/rsyslog/queue"
)
}
op:
content: |
if [ $fromhost == "foo" ] then stop