Auditd

Auditd-related search macros, datamodel queries, transformations and configurations

Auditd is a tool for maintaining logs for events that take place on Linux systems to help system administrators and security analysts monitor security breaches and incidents.

Rules

You can use auditd.rulesarrow-up-right to get a better idea of how rules are written for auditd.

Configuration

Auditd, by default, stores logs in /var/log/audit directory. This path can be changed in the auditd.conf file.

Read more about it at - https://man7.org/linux/man-pages/man5/auditd.conf.5.htmlarrow-up-right

The logs are stored in ASCII format as key-value pairs. Some of the values, such as proctitle, are encoded in hexadecimal format. You can use ausearch -i to decode it while viewing logs on the command line. The logs will have to be decoded using evals when importing them into Splunk -

chevron-rightExtracting time in a human-readable format along with the message IDhashtag
chevron-rightDecoding "proctitle" fieldhashtag

Since each event is stored over multiple lines, when imported into Splunk, it will be split up into multiple "events" that will have to be grouped using the msg field. This can be done using the transaction command or by using a subsearch.

chevron-rightUsing a subsearch to find complete events based on a keyhashtag

Last updated