- #rm -rf /etc/log.d/scripts/logfiles
- cp -f $(DIR_SRC)/config/logwatch/dialup /etc/log.d/scripts/services/dialup
- cp -f $(DIR_SRC)/config/logwatch/dialup.conf /etc/log.d/conf/services/dialup.conf
-
- #sed -i 's/df -h/df -h -x rootfs/' /etc/log.d/scripts/services/zz-disk_space
- #for i in `find /etc/log.d -type f`; do \
- # sed -i 's/perl -w/perl/' $$i; \
- #done
- # The httpd log checker script considers any request containing the word
- # null to be an exploit attempt, reverse this behaviour as we have a
- # null.gif
- #sed -i -e "/ 'null',/d" /etc/log.d/scripts/services/http
- #chmod -R 755 /etc/log.d
+ cp -f $(DIR_SRC)/config/logwatch/dialup /usr/share/logwatch/scripts/services/dialup
+ cp -f $(DIR_SRC)/config/logwatch/dialup.conf /usr/share/logwatch/dist.conf/services/dialup.conf
+
+ -mkdir -p /var/cache/logwatch
+ chmod -v 777 /var/cache/logwatch
+ -mkdir -p /var/log/logwatch
+ chmod -v 755 /var/log/logwatch
+ -rm -rf /etc/logwatch/conf
+ ln -vsf /usr/share/logwatch/default.config /etc/logwatch/conf
+