Auditd

Auditd-related search macros, datamodel queries, transformations and configurations

Auditd is a tool for maintaining logs for events that take place on Linux systems to help system administrators and security analysts monitor security breaches and incidents.

Rules

You can use auditd.rules to get a better idea of how rules are written for auditd.

Configuration

Auditd, by default, stores logs in /var/log/audit directory. This path can be changed in the auditd.conf file.

Read more about it at - https://man7.org/linux/man-pages/man5/auditd.conf.5.html

The logs are stored in ASCII format as key-value pairs. Some of the values, such as proctitle, are encoded in hexadecimal format. You can use ausearch -i to decode it while viewing logs on the command line. The logs will have to be decoded using evals when importing them into Splunk -

Extracting time in a human-readable format along with the message ID
Decoding "proctitle" field

Since each event is stored over multiple lines, when imported into Splunk, it will be split up into multiple "events" that will have to be grouped using the msg field. This can be done using the transaction command or by using a subsearch.

Using a subsearch to find complete events based on a key

Last updated