-
Notifications
You must be signed in to change notification settings - Fork 211
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFE: accept input format compatible with other logging systems #130
Comments
I really like this idea! |
One of the features of ausearch (--checkpoint) makes use of /var/log/audit file structure to maintain state in the situation where one wants to process new (since the last ausearch invocation) auditd events. If one switched to systemd-journald exclusively, how would this be achieved? I am particularly interested in the use case of an environment where there may be 200k+ hosts, all sending logs to a centralised logging capability. |
No, but these want the opposite: journald would not store audit messages. I want to stop auditd from logging. I don't have any requirements for compliance with anything. |
Would |
I've not used journalctl. I suppose if you are recommending the removal of a major element of a capability, then you need to at the same time, propose a transition mechanism, as there may be a lot of log processing capability that relies on the /var/log/audit structure (logstash, splunk, etc). Perhaps a better way forward is to offer, along with your justified better solution, a method where one can still make use of the the older mechanisms. For example, if you are proposing the removal of auditd directly writing to /var/log/audit, then offer a means of systemd-journald and all it's alternatives replicating /var/log/audit. |
To clarify, I'm not proposing of removing anything for others, but add a new optional feature for |
Would uninstalling audit achieve the same goal? |
No, because I need |
I'm confused, you said you don't have any requirements for compliance or anything, but you want rules loaded? It sounds like you do have requirements of some kind. The problem is journald uses the multicast socket which is not reliable. Journald's events are not suitable for use off machine or after accounts have been deleted. There's a lot of stuff besides audit events in journald - meaning searches will be slower. Since anyone can write to syslog, how do you ensure someone is not spoofing audit events? There are occasions where journald gets double log entries. This is likely to give any reporting tools a problem. And then there is the issue of some of the tools require DAEMON_START, DAEMON_END events to bracket sessions that are not terminated. I'd be willing to review patches if someone submits them. But given other tasks that are a higher priority to me, I'm not likely to write the code myself. |
I meant that as a home user I don't need to care about (for example) PCI requirements.
Thanks for the heads up. I guess these problems may be more visible with more testing. I haven't had any problems but maybe I didn't expect any. I'll make a patch. |
Ah. I clearly mis-read your proposal. Thanks. |
Looking at possible implementations, I noticed some issues.
Regarding the input options:
Overall I think it would be easier to modify |
I implemented this tentatively for |
See also systemd/systemd#15921
Is your feature request related to a problem? Please describe.
Currently auditd stores separate logs in
/var/log/audit
. I'd like to discontinue using auditd for logging (but not for other audit control) and use only systemd-journald logs also forausearch
etc.ausearch
is able to read logs also from standard input. The output format ofjournalctl
is quite similar to format of/var/log/audit/audit.log
and traditional format used by syslogd, butausearch
does not understand it.Describe the solution you'd like
Enhance audit tools (especially
ausearch
) to understand some existing journalctl output format (for example syslog/short-unix or JSON). This could be useful even when not using journald. For example,/var/log/audit/*
might be damaged or lost but other logs (syslog, journal etc) could contain same information.Describe alternatives you've considered
audit
format forjournalctl
which can be directly read by audit tools, for example:journalctl -b --output=audit | ausearch
.So, this record from
journalctl --output=short-unix
should be printed when
--output=audit
is specified in the format in/var/log/audit/audit.log
:ausearch
could be easily implemented also injournalctl
. But format compatibility between journalctl and audit tools would still be needed in order to use the other audit tools likeaudit2allow
to process SELinux AVC denials. Reimplementingaudit2allow
byjournalctl
does not seem to make sense.As requested by the issue form, I created an account on Red Hat Bugzilla to report this but unfortunately I wasn't able to find the right product.
The text was updated successfully, but these errors were encountered: