1AUDISP-REMOTE.CONF:(5) System Administration Utilities AUDISP-REMOTE.CONF:(5)
2
3
4
6 audisp-remote.conf - the audisp-remote configuration file
7
9 audisp-remote.conf is the file that controls the configuration of the
10 audit remote logging subsystem. The options that are available are as
11 follows:
12
13
14 remote_server
15 This is a one word character string that is the remote server
16 hostname or address that this plugin will send log information
17 to. This can be the numeric address or a resolvable hostname.
18
19 port This option is an unsigned integer that indicates what port to
20 connect to on the remote machine.
21
22 local_port
23 This option is an unsigned integer that indicates what local
24 port to connect from on the local machine. If unspecified (the
25 default) or set to the word any then any available unpriviledged
26 port is used. This is a security mechanism to prevent untrusted
27 user space apps from injecting events into the audit daemon. You
28 should set it to an unused port < 1024 to ensure that only priv‐
29 ileged users can bind to that port. Then also set the
30 tcp_client_ports in the aggregating auditd.conf file to match
31 the ports that clients are sending from.
32
33 transport
34 This parameter tells the remote logging app how to send events
35 to the remote system. The only valid value right now is tcp. If
36 set to tcp, the remote logging app will just make a normal clear
37 text connection to the remote system. This is not used if ker‐
38 beros is enabled.
39
40 mode This parameter tells the remote logging app what strategy to use
41 getting records to the remote system. Valid values are immedi‐
42 ate, and forward . If set to immediate, the remote logging app
43 will attempt to send events immediately after getting them.
44 forward means that it will store the events to disk and then
45 attempt to send the records. If the connection cannot be made,
46 it will queue records until it can connect to the remote system.
47 The depth of the queue is controlled by the queue_depth option.
48
49 queue_file
50 Path of a file used for the event queue if mode is set to for‐
51 ward. The default is /var/spool/audit/remote.log.
52
53 queue_depth
54 This option is an unsigned integer that determines how many
55 records can be buffered to disk or in memory before considering
56 it to be a failure sending. This parameter affects the forward
57 mode of the mode option and internal queueing for temporary net‐
58 work outtages. The default depth is 2048.
59
60 format This parameter tells the remote logging app what data format
61 will be used for the messages sent over the network. The
62 default is managed which adds some overhead to ensure each mes‐
63 sage is properly handled on the remote end, and to receive sta‐
64 tus messages from the remote server. If ascii is given instead,
65 each message is a simple ASCII text line with no overhead at
66 all. If mode is set to forward, format must be managed.
67
68 network_retry_time
69 The time, in seconds, between retries when a network error is
70 detected. Note that this pause applies starting after the sec‐
71 ond attempt, so as to avoid unneeded delays if a reconnect is
72 sufficient to fix the problem. The default is 1 second.
73
74 max_tries_per_record
75 The maximum number of times an attempt is made to deliver each
76 message. The minimum value is one, as even a completely suc‐
77 cessful delivery requires at least one try. If too many
78 attempts are made, the network_failure_action action is per‐
79 formed. The default is 3.
80
81 max_time_per_record
82 The maximum amount of time, in seconds, spent attempting to
83 deliver each message. Note that both this and
84 max_tries_per_record should be set, as each try may take a long
85 time to time out. The default value is 5 seconds. If too much
86 time is used on a message, the network_failure_action action is
87 performed.
88
89 heartbeat_timeout
90 This parameter determines how often in seconds the client should
91 send a heartbeat event to the remote server. This is used to let
92 both the client and server know that each end is alive and has
93 not terminated in a way that it did not shutdown the connection
94 uncleanly. This value must be coordinated with the server's
95 tcp_client_max_idle setting. The default value is 0 which dis‐
96 ables sending a heartbeat.
97
98 network_failure_action
99 This parameter tells the system what action to take whenever
100 there is an error detected when sending audit events to the
101 remote system. Valid values are ignore, syslog, exec, suspend,
102 single, halt, and stop. If set to ignore, the remote logging
103 app does nothing. Syslog means that it will issue a warning to
104 syslog. This is the default. exec /path-to-script will execute
105 the script. You cannot pass parameters to the script. Suspend
106 will cause the remote logging app to stop sending records to the
107 remote system. The logging app will still be alive. The single
108 option will cause the remote logging app to put the computer
109 system in single user mode. The stop option will cause the
110 remote logging app to exit, but leave other plugins running. The
111 halt option will cause the remote logging app to shutdown the
112 computer system.
113
114 disk_low_action
115 Likewise, this parameter tells the system what action to take if
116 the remote end signals a disk low error. The default is to
117 ignore it.
118
119 disk_full_action
120 Likewise, this parameter tells the system what action to take if
121 the remote end signals a disk full error. The default is to
122 ignore it.
123
124 disk_error_action
125 Likewise, this parameter tells the system what action to take if
126 the remote end signals a disk error. The default is to log it
127 to syslog.
128
129 remote_ending_action
130 Likewise, this parameter tells the system what action to take if
131 the remote end signals a disk error. This action has one addi‐
132 tional option, reconnect which tells the remote plugin to
133 attempt to reconnect to the server upon receipt of the next
134 audit record. If it is unsuccessful, the audit record could be
135 lost. The default is to reconnect.
136
137 generic_error_action
138 Likewise, this parameter tells the system what action to take if
139 the remote end signals an error we don't recognize. The default
140 is to log it to syslog.
141
142 generic_warning_action
143 Likewise, this parameter tells the system what action to take if
144 the remote end signals a warning we don't recognize. The
145 default is to log it to syslog.
146
147 queue_error_action
148 Likewise, this parameter tells the system what action to take if
149 there is a problem working with a local record queue. The
150 default is to exit.
151
152 overflow_action
153 This parameter tells the system what action to take if the
154 internal event queue overflows. Valid values are ignore, syslog,
155 suspend, single, and halt . If set to ignore, the remote log‐
156 ging app does nothing. Syslog means that it will issue a warn‐
157 ing to syslog. This is the default. Suspend will cause the
158 remote logging app to stop sending records to the remote system.
159 The logging app will still be alive. The single option will
160 cause the remote logging app to put the computer system in sin‐
161 gle user mode. The halt option will cause the remote logging app
162 to shutdown the computer system.
163
164 enable_krb5
165 If set to "yes", Kerberos 5 will be used for authentication and
166 encryption. Default is "no". Note that encryption can only be
167 used with managed connections, not plain ASCII.
168
169 krb5_principal
170 If specified, This is the expected principal for the server.
171 The client and server will use the specified principal to nego‐
172 tiate the encryption. The format for the krb5_principal is like
173 somename/hostname, see the auditd.conf man page for details. If
174 not specified, the krb5_client_name and remote_server values are
175 used.
176
177 krb5_client_name
178 This specifies the name portion of the client's own principal.
179 If unspecified, the default is "auditd". The remainder of the
180 principal will consist of the host's fully qualified domain name
181 and the default Kerberos realm, like this: auditd/host14.exam‐
182 ple.com@EXAMPLE.COM (assuming you gave "auditd" as the
183 krb_client_name). Note that the client and server must have the
184 same principal name and realm.
185
186 krb5_key_file
187 Location of the key for this client's principal. Note that the
188 key file must be owned by root and mode 0400. The default is
189 /etc/audisp/audisp-remote.key
190
191
192
194 Specifying a local port may make it difficult to restart the audit sub‐
195 system due to the previous connection being in a TIME_WAIT state, if
196 you're reconnecting to and from the same hosts and ports as before.
197
198 The network failure logic works as follows: The first attempt to
199 deliver normally "just works". If it doesn't, a second attempt is
200 immediately made, perhaps after reconnecting to the server. If the
201 second attempt also fails, audispd-remote pauses for the configured
202 time and tries again. It continues to pause and retry until either too
203 many attempts have been made or the allowed time expires. Note that
204 these times govern the maximum amount of time the remote server is
205 allowed in order to reboot, if you want to maintain logging across a
206 reboot.
207
208
210 audispd(8), audisp-remote(8), auditd.conf(5).
211
213 Steve Grubb
214
215
216
217
218Red Hat Mar 2011 AUDISP-REMOTE.CONF:(5)