Questo contenuto non è disponibile nella lingua selezionata.
7.7. Searching the Audit Log Files
The ausearch utility allows you to search Audit log files for specific events. By default, ausearch searches the
/var/log/audit/audit.log file. You can specify a different file using the ausearch options -if file_name command. Supplying multiple options in one ausearch command is equivalent to using the AND operator.
Example 7.6. Using ausearch to search Audit log files
To search the
/var/log/audit/audit.log file for failed login attempts, use the following command:
ausearch --message USER_LOGIN --success no --interpret
~]# ausearch --message USER_LOGIN --success no --interpret
To search for all account, group, and role changes, use the following command:
ausearch -m ADD_USER -m DEL_USER -m ADD_GROUP -m USER_CHAUTHTOK -m DEL_GROUP -m CHGRP_ID -m ROLE_ASSIGN -m ROLE_REMOVE -i
~]# ausearch -m ADD_USER -m DEL_USER -m ADD_GROUP -m USER_CHAUTHTOK -m DEL_GROUP -m CHGRP_ID -m ROLE_ASSIGN -m ROLE_REMOVE -i
To search for all logged actions performed by a certain user, using the user's login ID (
auid), use the following command:
ausearch -ua 500 -i
~]# ausearch -ua 500 -i
To search for all failed system calls from yesterday up until now, use the following command:
ausearch --start yesterday --end now -m SYSCALL -sv no -i
~]# ausearch --start yesterday --end now -m SYSCALL -sv no -i
For a full listing of all
ausearch options, see the ausearch(8) man page.