Auditd
Auditd-related search macros, datamodel queries, transformations and configurations
Auditd is a tool for maintaining logs for events that take place on Linux systems to help system administrators and security analysts monitor security breaches and incidents.
Rules
You can use auditd.rules to get a better idea of how rules are written for auditd.
Configuration
Auditd, by default, stores logs in /var/log/audit directory. This path can be changed in the auditd.conf file.
Read more about it at - https://man7.org/linux/man-pages/man5/auditd.conf.5.html
The logs are stored in ASCII format as key-value pairs. Some of the values, such as proctitle, are encoded in hexadecimal format. You can use ausearch -i to decode it while viewing logs on the command line. The logs will have to be decoded using evals when importing them into Splunk -
Since each event is stored over multiple lines, when imported into Splunk, it will be split up into multiple "events" that will have to be grouped using the msg field. This can be done using the transaction command or by using a subsearch.
Last updated