When troubleshooting issues with your SecureDrop instance, be sure to examine
all relevant log files on both servers. To work with logs, it is helpful to be
familiar with commands like
grep; to inspect older,
archived logs (names end with
.gz) you can use commands like
zgrep to avoid manually decompressing each file.
You can use the
securedrop-admin tool to extract logs to
send to Freedom of the Press Foundation for analysis. Run the following
command on your Admin Workstation:
cd ~/Persistent/securedrop ./securedrop-admin logs
This command will produce encrypted tarballs containing logs from each server. See the command output for more information.
Logs to examine on both servers
/var/log/kern.log: Use this file to investigate kernel-related issues, including warnings or errors specific to AppArmor or grsecurity (a set of patches applied to the kernels for additional security hardening)
/var/log/syslog: Use this file to investigate most other system issues, including iptables configuration problems or Tor network issues. Use search patterns, e.g., search for “app Tor” to find log entries specific to Tor.
Application Server Logs
See the directory
/var/log/apache2/* for web server access and error logs.
In production systems, logging is only enabled for the Journalist Interface
to the files
journalist-error.log, and the
logs do not contain IP address information.
When investigating an application error on the Source Interface (e.g., if you see an “Internal Server Error” when submitting a document), it can make sense to temporarily enable error logging. To do so:
Log into your Application Server from your Admin Workstation via
Edit the file
Comment out the old
LogLeveldirectives, e.g., like so:
# Enabling logging for error investigation, 2020-04-18, ~admin
# ErrorLog /dev/null
# LogLevel critical
Add the desired new logging configuration in the same location (inside the
Save the file and reload the configuration with
sudo service apache2 reload
Visit the Source Interface and reproduce the error
Inspect the log file
/var/log/apache2/source-error.logfor any details
Remember to set the configuration back to the default values once your investigation is complete.
Note that the
debug logging level is highly verbose; if you want to adjust
it, see the Apache documentation
for more information about the different logging levels.
Monitor Server Logs
/var/ossec/logs/ossec.log: Examine this file to investigate problems with OSSEC itself not functioning as expected (e.g., you are not seeing alerts when you would expect them to).
/var/ossec/logs/alerts/alerts.log: This file contains the most recent alerts generated by OSSEC. If you have correctly configured OSSEC emails, the text of these alerts should correspond to the text of the emails.
/var/log/procmail.log: These files contain information about email delivery and email processing (for encrypting the alerts). Investigate these files if you believe OSSEC is correctly configured, but you are not receiving emails.