The chroot will need everything, from the SFTP server to the devices used for logging. That will be a lot to set up. It would be much easier to use the in-process SFTP server instead:
Code:
Subsystem sftp internal-sftp -l INFO -f LOCAL0
That will allow you to separate the logs more easily based on the log facility LOCAL0. You can choose LOCAL0 through LOCAL7. However, I'm not sure how RHEL does actual logging any more so you'll want to check with your support contract's contact for the latest info on how to reconfigure system logging to sort out specific kinds of messages into their own file.
But then for the chrooted users, you can use the %u in place of the user name:
Code:
Match Group chrooted
ChrootDirectory /mnt/sftp/ftp/%u/data/
However, keep in mind that /mnt/sftp/ftp/username/data/ has to be owned by root and not writable by others. So I'd just leave it like this:
Code:
Match Group chrooted
ChrootDirectory /mnt/sftp/ftp/%u/
So that /mnt/sftp/ftp/username/ is owned by root and /mnt/sftp/ftp/username/data/ itself is owned by the appropriate user.