Sponsored Content
Full Discussion: audit log timestamps in GMT
Operating Systems Solaris audit log timestamps in GMT Post 302555145 by chinchao on Wednesday 14th of September 2011 04:48:34 AM
Old 09-14-2011
audit log timestamps in GMT

I am aware that the timestamps of the audit log files are in the following format :

file, 2011-09-13 07:40:24 .000 -4

Is there anyway that I can display the timestamps in local time format.

Thanks for the help.

---------- Post updated at 02:18 PM ---------- Previous update was at 01:06 PM ----------

I mean that the the -4 signifies the time in GMT. I need them to be in local time format. Is that possible through any auditreduce flags?
 

10 More Discussions You Might Find Interesting

1. Solaris

Solaris BSM audit log

I got a lot of this message in my /var/audit log how can I exclude this message? header,127,2,invalid event number,fe,hostsol1.com.sg,2007-12-21 00:10:01.001 +08:00,argument,1,0x5,processor ID,argument ,2,0x3,flag,text,P_STATUS,subject,zhang1,root,root,root,root,18228,576129155,291 131094... (1 Reply)
Discussion started by: geoffry
1 Replies

2. AIX

audit.log file rotation

Hi guys, I've googled this quite a bit, and tried searching on these forums, but haven't found a solution to my problem. I wanted to inquire about AIX's audit subsystem - more specifically, how to rotate its log file. So far I've been able to find how to rotate AIX syslog log files, and I... (2 Replies)
Discussion started by: w1r3d
2 Replies

3. Solaris

delete audit old log

hi all, i enabled audit in my server it is working fine, now i want to delete old logs from audit file ,plz find a solution for it, Regards spandan (2 Replies)
Discussion started by: spandhan
2 Replies

4. Cybersecurity

audit user in BSM/C2 Log

Hi, I keep encountering events in the BSM/C2 logs which shows that the audit-user who performed the event is the user (e.g. ongkk in the example below). However, the user is able to show me that he wasn't logged in at that time nor have the rights to perform the event (e.g. su in this example).... (5 Replies)
Discussion started by: BERNIELEE68
5 Replies

5. Solaris

how to find whether audit log is secure?

How do i find if audit logs is secured inside Solaris 10? · Verify that that audit log files are secured and owned appropriately. this is the question (1 Reply)
Discussion started by: werbotim
1 Replies

6. AIX

When AIX audit start, How to set the /audit/stream.out file size ?

Dear All When I start the AIX(6100-06)audit subsystem. the log will save in /audit/stream.out (or /audit/trail), but in default when /audit/stream.out to grow up to 150MB. It will replace the original /audit/stream.out (or /audit/trail). Then the /audit/stream.out become empty and... (2 Replies)
Discussion started by: nnnnnnine
2 Replies

7. Shell Programming and Scripting

monitor(audit) and log changes inside directory

Hi, everyone I would like to write ksh script in ksh (HP-UX), to audit any changes inside target directories. My enviroment has many constrains, so I can only use ksh and cannot install any 3rd party soft or command (include perl or other languages) The script functions like below 1) take a... (1 Reply)
Discussion started by: stev.h
1 Replies

8. Red Hat

Audit.log Management

Hi, I'm fairly new to administering RedHat (or any Linux system for that matter), and was wondering if someone could help me work out how to best manage audit logs. In a nutshell, this is what I need to do: - Compress audit.log file(s) once a month and delete the originals - The... (0 Replies)
Discussion started by: Seonix
0 Replies

9. SuSE

Alert for Audit log

Dear users, I have SLES 11 and SLES 10 servers. I'd like to receive an alert when audit log files reach certain percentage of full. 1. Is '/etc/audit/auditd.conf' the right file to modify? 2. I'd like to receive email alert. Can I specify my email in this parameter 'action_mail_acct... (1 Reply)
Discussion started by: JDBA
1 Replies

10. Shell Programming and Scripting

Parse audit log

I am trying to parse the audit log to find a particular date that associated with a user record. The Date and the context of the record that I need to extract from the audit.log are 11-07-2015, the username and the activity he or she performed that day. Here is my code: grep -c date -d... (3 Replies)
Discussion started by: dellanicholson
3 Replies
auditreduce(1M) 					  System Administration Commands					   auditreduce(1M)

NAME
auditreduce - merge and select audit records from audit trail files SYNOPSIS
auditreduce [options] [audit-trail-file]... DESCRIPTION
auditreduce allows you to select or merge records from audit trail files. Audit files can be from one or more machines. The merge function merges together audit records from one or more input audit trail files into a single output file. The records in an audit trail file are assumed to be sorted in chronological order (oldest first) and this order is maintained by auditreduce in the output file. Unless instructed otherwise, auditreduce will merge the entire audit trail, which consists of all the audit trail files in the directory structure audit_root_dir/*/files (see audit_control(4) for details of the structure of the audit root). Unless specified with the -R or -S option, audit_root_dir defaults to /etc/security/audit. By using the file selection options it is possible to select some subset of these files, or files from another directory, or files named explicitly on the command line. The select function allows audit records to be selected on the basis of numerous criteria relating to the record's content (see audit.log(4) for details of record content). A record must meet all of the record-selection-option criteria to be selected. Audit Trail Filename Format Any audit trail file not named on the command line must conform to the audit trail filename format. Files produced by the audit system already have this format. Output file names produced by auditreduce are in this format. It is: start-time.end-time.suffix where start-time is the 14-character timestamp of when the file was opened, end-time is the 14-character timestamp of when the file was closed, and suffix is the name of the machine which generated the audit trail file, or some other meaningful suffix (for example, all, if the file contains a combined group of records from many machines). The end-time can be the literal string not_terminated, to indicate that the file is still being written to by the audit system. Timestamps are of the form yyyymmddhhmmss (year, month, day, hour, minute, second). The timestamps are in Greenwich Mean Time (GMT). OPTIONS
File Selection Options The file selection options indicate which files are to be processed and certain types of special treatment. -A All of the records from the input files will be selected regardless of their timestamp. This option effectively disables the -a, -b, and -d options. This is useful in preventing the loss of records if the -D option is used to delete the input files after they are pro- cessed. Note, however, that if a record is not selected due to another option, then -A will not override that. -C Only process complete files. Files whose filename end-time timestamp is not_terminated are not processed (such a file is currently being written to by the audit system). This is useful in preventing the loss of records if -D is used to delete the input files after they are processed. It does not apply to files specified on the command line. -D suffix Delete input files after they are read if the entire run is successful. If auditreduce detects an error while reading a file, then that file is not deleted. If -D is specified, -A, -C and -O are also implied. suffix is given to the -O option. This helps prevent the loss of audit records by ensuring that all of the records are written, only complete files are processed, and the records are written to a file before being deleted. Note that if both -D and -O are specified in the command line, the order of specification is significant. The suffix associated with the latter specification is in effect. -M machine Allows selection of records from files with machine as the filename suffix. If -M is not specified, all files are processed regardless of suffix. -M can also be used to allow selection of records from files that contain combined records from many machines and have a common suffix (such as all). -N Select objects in new mode.This flag is off by default, thus retaining backward compatibility. In the existing, old mode, specifying the -e, -f, -g, -r, or -u flags would select not only actions taken with those IDs, but also certain objects owned by those IDs. When running in new mode, only actions are selected. In order to select objects, the -o option must be used. -O suffix Direct output stream to a file in the current audit_root_dir with the indicated suffix. suffix can alternatively contain a full path- name, in which case the last component is taken as the suffix, ahead of which the timestamps will be placed, ahead of which the remain- der of the pathname will be placed. If the -O option is not specified, the output is sent to the standard output. When auditreduce places timestamps in the filename, it uses the times of the first and last records in the merge as the start-time and end-time. -Q Quiet. Suppress notification about errors with input files. -R pathname Specify the pathname of an alternate audit root directory audit_root_dir to be pathname. Therefore, rather than using /etc/secu- rity/audit/*/files by default, pathname/*/files will be examined instead. Note - The root file system of any non-global zones must not be referenced with the -R option. Doing so might damage the global zone's file system, might compromise the security of the global zone, and might damage the non-global zone's file system. See zones(5). -S server This option causes auditreduce to read audit trail files from a specific location (server directory). server is normally interpreted as the name of a subdirectory of the audit root, therefore auditreduce will look in audit_root_dir/server/files for the audit trail files. But if server contains any `/' characters, it is the name of a specific directory not necessarily contained in the audit root. In this case, server/files will be consulted. This option allows archived files to be manipulated easily, without requiring that they be physi- cally located in a directory structure like that of /etc/security/audit. -V Verbose. Display the name of each file as it is opened, and how many records total were written to the output stream. Record Selection Options The record selection options listed below are used to indicate which records are written to the output file produced by auditreduce. Multiple arguments of the same type are not permitted. -a date-time Select records that occurred at or after date-time. The date-time argument is described under Option Arguments, below. date-time is in local time. The -a and -b options can be used together to form a range. -b date-time Select records that occurred before date-time. -c audit-classes Select records by audit class. Records with events that are mapped to the audit classes specified by audit-classes are selected. Audit class names are defined in audit_class(4). The audit-classes can be a comma separated list of audit flags like those described in audit_control(4). Using the audit flags, one can select records based upon success and failure criteria. -d date-time Select records that occurred on a specific day (a 24-hour period beginning at 00:00:00 of the day specified and ending at 23:59:59). The day specified is in local time. The time portion of the argument, if supplied, is ignored. Any records with timestamps during that day are selected. If any hours, minutes, or seconds are given in time, they are ignored. -d can not be used with -a or -b. -e effective-user Select records with the specified effective-user. -f effective-group Select records with the specified effective-group. -g real-group Select records with the specified real-group. -j subject-ID Select records with the specified subject-ID where subject-ID is a process ID. -l label Select records with the specified label (or label range), as explained under "Option Arguments," below. This option is available only if the system is configured with Trusted Extensions. -m event Select records with the indicated event. The event is the literal string or the event number. -o object_type=objectID_value Select records by object type. A match occurs when the record contains the information describing the specified object_type and the object ID equals the value specified by objectID_value. The allowable object types and values are as follows: file=pathname Select records containing file system objects with the specified pathname, where pathname is a comma separated list of regular expressions. If a regular expression is preceded by a tilde (~), files matching the expression are excluded from the output. For example, the option file=~/usr/openwin,/usr,/etc would select all files in /usr or /etc except those in /usr/openwin. The order of the regular expressions is important because auditreduce processes them from left to right, and stops when a file is known to be either selected or excluded. Thus the option file= /usr, /etc, ~/usr/openwin would select all files in /usr and all files in /etc. Files in /usr/openwin are not excluded because the regular expression /usr is matched first. Care should be given in surrounding the pathname with quotes so as to prevent the shell from expanding any tildes. filegroup=group Select records containing file system objects with group as the owning group. fileowner=user Select records containing file system objects with user as the owning user. msgqid=ID Select records containing message queue objects with the specified ID where ID is a message queue ID. msgqgroup=group Select records containing message queue objects with group as the owning or creating group. msgqowner=user Select records containing message queue objects with user as the owning or creating user. pid=ID Select records containing process objects with the specified ID where ID is a process ID. Process are objects when they are receivers of signals. procgroup=group Select records containing process objects with group as the real or effective group. procowner=user Select records containing process objects with user as the real or effective user. semid=ID Select records containing semaphore objects with the specified ID where ID is a semaphore ID. semgroup=group Select records containing semaphore objects with group as the owning or creating group. semowner=user Select records containing semaphore objects with user as the owning or creating user. shmid=ID Select records containing shared memory objects with the specified ID where ID is a shared memory ID. shmgroup=group Select records containing shared memory objects with group as the owning or creating group. shmowner=user Select records containing shared memory objects with user as the owning or creating user. sock=port_number|machine Select records containing socket objects with the specified port_number or the specified machine where machine is a machine name as defined in hosts(4). fmri=service instance Select records containing fault management resource identifier (FMRI) objects with the specified service instance. See smf(5). -r real-user Select records with the specified real-user. -s session-id Select audit records with the specified session-id. -u audit-user Select records with the specified audit-user. -z zone-name Select records from the specified zone name. The zone name selection is case-sensitive. When one or more filename arguments appear on the command line, only the named files are processed. Files specified in this way need not conform to the audit trail filename format. However, -M, -S, and -R must not be used when processing named files. If the filename is ``-'' then the input is taken from the standard input. Option Arguments audit-trail-file An audit trail file as defined in audit.log(4). An audit trail file not named on the command line must conform to the audit trail file name format. Audit trail files produced as output of auditreduce are in this format as well. The format is: start-time . end-time . suffix start-time is the 14 character time stamp denoting when the file was opened. end-time is the 14 character time stamp denoting when the file was closed. end-time can also be the literal string not_terminated, indicating the file is still be written to by the audit daemon or the file was not closed properly (a system crash or abrupt halt occurred). suffix is the name of the machine that generated the audit trail file (or some other meaningful suffix; for example, all would be a good suffix if the audit trail file contains a combined group of records from many machines). date-time The date-time argument to -a, -b, and -d can be of two forms: An absolute date-time takes the form: yyyymmdd [ hh [ mm [ ss ]]] where yyyy specifies a year (with 1970 as the earliest value), mm is the month (01-12), dd is the day (01-31), hh is the hour (00-23), mm is the minute (00-59), and ss is the second (00-59). The default is 00 for hh, mm and ss. An offset can be specified as: +n d|h|m| s where n is a number of units, and the tags d, h, m, and s stand for days, hours, minutes and seconds, respectively. An offset is relative to the starting time. Thus, this form can only be used with the -b option. event The literal string or ordinal event number as found in audit_event(4). If event is not found in the audit_event file it is considered invalid. group The literal string or ordinal group ID number as found in group(4). If group is not found in the group file it is considered invalid. group can be negative. label The literal string representation of a MAC label or a range of two valid MAC labels. To specify a range, use x;y where x and y are valid MAC labels. Only those records that are fully bounded by x and y will be selected. If x or y is omitted, the default uses ADMIN_LOW or ADMIN_HIGH respectively. Notice that quotes must be used when specifying a range. pathname A regular expression describing a pathname. user The literal username or ordinal user ID number as found in passwd(4). If the username is not found in the passwd file it is considered invalid. user can be negative. EXAMPLES
Example 1 The auditreduce command praudit(1M) is available to display audit records in a human-readable form. This will display the entire audit trail in a human-readable form: % auditreduce | praudit If all the audit trail files are being combined into one large file, then deleting the original files could be desirable to prevent the records from appearing twice: % auditreduce -V -D /etc/security/audit/combined/all This displays what user milner did on April 13, 1988. The output is displayed in a human-readable form to the standard output: % auditreduce -d 19880413 -u milner | praudit The above example might produce a large volume of data if milner has been busy. Perhaps looking at only login and logout times would be simpler. The -c option will select records from a specified class: % auditreduce -d 19880413 -u milner -c lo | praudit To see milner's login/logout activity for April 13, 14, and 15, the following is used. The results are saved to a file in the current work- ing directory. Notice that the name of the output file will have milnerlo as the suffix, with the appropriate timestamp prefixes. Notice also that the long form of the name is used for the -c option: % auditreduce -a 19880413 -b +3d -u milner -c login_logout -O milnerlo To follow milner's movement about the file system on April 13, 14, and 15 the chdir record types could be viewed. Notice that in order to get the same time range as the above example we needed to specify the -b time as the day after our range. This is because 19880416 defaults to midnight of that day, and records before that fall on 0415, the end-day of the range. % auditreduce -a 19880413 -b 19880416 -u milner -m AUE_CHDIR | praudit In this example, the audit records are being collected in summary form (the login/logout records only). The records are being written to a summary file in a different directory than the normal audit root to prevent the selected records from existing twice in the audit root. % auditreduce -d 19880330 -c lo -O /etc/security/audit_summary/logins If activity for user ID 9944 has been observed, but that user is not known to the system administrator, then the command in the following example searches the entire audit trail for any records generated by that user. auditreduce queries the system about the current validity of ID 9944 and displays a warning message if it is not currently active: % auditreduce -O /etc/security/audit_suspect/user9944 -u 9944 To get an audit log of only the global zone: % auditreduce -z global FILES
/etc/security/audit/server/files/* location of audit trails, when stored ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ |Interface Stability |See below. | +-----------------------------+-----------------------------+ The command invocation is Stable. The binary file format is Stable. The binary file contents is Unstable. SEE ALSO
bsmconv(1M), praudit(1M), audit.log(4), audit_class(4), audit_control(4), group(4), hosts(4), passwd(4), attributes(5), smf(5) See the section on Solaris Auditing in System Administration Guide: Security Services. DIAGNOSTICS
auditreduce displays error messages if there are command line errors and then exits. If there are fatal errors during the run, auditreduce displays an explanatory message and exits. In this case, the output file might be in an inconsistent state (no trailer or partially written record) and auditreduce displays a warning message before exiting. Successful invocation returns 0 and unsuccessful invocation returns 1. Since auditreduce might be processing a large number of input files, it is possible that the machine-wide limit on open files will be exceeded. If this happens, auditreduce displays a message to that effect, give information on how many file there are, and exit. If auditreduce displays a record's timestamp in a diagnostic message, that time is in local time. However, when filenames are displayed, their timestamps are in GMT. BUGS
Conjunction, disjunction, negation, and grouping of record selection options should be allowed. NOTES
The functionality described in this man page is available only if the Solaris Auditing has been enabled. See bsmconv(1M) for more informa- tion. The -z option should be used only if the audit policy zonename is set. If there is no zonename token, then no records will be selected. SunOS 5.11 10 Apr 2006 auditreduce(1M)
All times are GMT -4. The time now is 04:35 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy