-
Notifications
You must be signed in to change notification settings - Fork 130
Audit Event Fields
bfuzzy edited this page Oct 26, 2018
·
1 revision
| NAME | FORMAT | MEANING | EXCEPTION |
|---|---|---|---|
| a[0-3] | numeric | the arguments to a syscall | syscall |
| a[[:digit:]+][.*] | encoded | the arguments to the execve syscall | execve |
| acct | encoded | a user's account name | |
| acl | alphabet | access mode of resource assigned to vm | |
| action | numeric | netfilter packet disposition | |
| added | numeric | number of new files detected | |
| addr | encoded | the remote address that the user is connecting from | |
| apparmor | encoded | apparmor event information | |
| arch | numeric | the elf architecture flags | |
| argc | numeric | the number of arguments to an execve syscall | |
| audit_backlog_limit | numeric | audit system's backlog queue size | |
| audit_backlog_wait_time | numeric | audit system's backlog wait time | |
| audit_enabled | numeric | audit systems's enable/disable status | |
| audit_failure | numeric | audit system's failure mode | |
| auid | numeric | login user ID | |
| banners | alphanumeric | banners used on printed page | |
| bool | alphanumeric | name of SELinux boolean | |
| bus | alphanumeric | name of subsystem bus a vm resource belongs to | |
| capability | numeric | posix capabilities | |
| cap_fe | numeric | file assigned effective capability map | |
| cap_fi | numeric | file inherited capability map | |
| cap_fp | numeric | file permitted capability map | |
| cap_fver | numeric | file system capabilities version number | |
| cap_pe | numeric | process effective capability map | |
| cap_pi | numeric | process inherited capability map | |
| cap_pp | numeric | process permitted capability map | |
| category | alphabet | resource category assigned to vm | |
| cgroup | encoded | path to cgroup in sysfs | |
| changed | numeric | number of changed files | |
| cipher | alphanumeric | name of crypto cipher selected | |
| class | alphabet | resource class assigned to vm | |
| cmd | encoded | command being executed | |
| code | numeric | seccomp action code | |
| comm | encoded | command line program name | |
| compat | numeric | is_compat_task result | |
| cwd | encoded | the current working directory | |
| daddr | alphanumeric | remote IP address | |
| data | encoded | TTY text | |
| default-context | alphanumeric | default MAC context | |
| dev | numeric | in path records | major and minor for device |
| dev | alphanumeric | device name as found in /dev | avc |
| device | encoded | device name | |
| dir | encoded | directory name | |
| direction | alphanumeric | direction of crypto operation | |
| dmac | numeric | remote MAC address | |
| dport | numeric | remote port number | |
| egid | numeric | effective group ID | |
| enforcing | numeric | new MAC enforcement status | |
| entries | numeric | number of entries in the netfilter table | |
| euid | numeric | effective user ID | |
| exe | encoded | executable name | |
| exit | numeric | syscall exit code | |
| fam | alphanumeric | socket address family | |
| family | numeric | netfilter protocol | |
| fd | numeric | file descriptor number | |
| file | encoded | file name | |
| flags | numeric | mmap syscall flags | |
| fe | numeric | file assigned effective capability map | |
| feature | alphanumeric | kernel feature being changed | |
| fi | numeric | file assigned inherited capability map | |
| fp | numeric | file assigned permitted capability map | |
| fp | alphanumeric | crypto key finger print | crypto_key |
| format | alphanumeric | audit log's format | |
| fsgid | numeric | file system group ID | |
| fsuid | numeric | file system user ID | |
| fver | numeric | file system capabilities version number | |
| gid | numeric | group ID | |
| grantors | alphanumeric | pam modules approving the action | |
| grp | encoded | group name | |
| hook | numeric | netfilter hook that packet came from | |
| hostname | alphanumeric | the hostname that the user is connecting from | |
| icmp_type | numeric | type of icmp message | |
| id | numeric | during account changes | the user ID of the account |
| igid | numeric | ipc object's group ID | |
| img-ctx | alphanumeric | the vm's disk image context string | |
| inif | numeric | in interface number | |
| ip | alphanumeric | network address of a printer | |
| ipid | numeric | IP datagram fragment identifier | |
| ino | numeric | inode number | |
| inode | numeric | inode number | |
| inode_gid | numeric | group ID of the inode's owner | |
| inode_uid | numeric | user ID of the inode's owner | |
| invalid_context | encoded | SELinux context | |
| ioctlcmd | numeric | The request argument to the ioctl syscall | |
| ipx-net | numeric | IPX network number | |
| item | numeric | which item is being recorded | |
| items | numeric | the number of path records in the event | |
| iuid | numeric | ipc object's user ID | |
| kernel | alphanumeric | kernel's version number | |
| key | encoded | key assigned from triggered audit rule | |
| kind | alphabet | server or client in crypto operation | |
| ksize | numeric | key size for crypto operation | |
| laddr | alphanumeric | local network address | |
| len | numeric | length | |
| lport | alphanumeric | local network port | |
| list | numeric | the audit system's filter list number | |
| mac | alphanumeric | crypto MAC algorithm selected | |
| macproto | numeric | ethernet packet type ID field | |
| maj | numeric | device major number | |
| major | numeric | device major number | |
| minor | numeric | device minor number | |
| mode | numeric | mode flags on a file | |
| model | alphanumeric | security model being used for virt | |
| msg | alphanumeric | the payload of the audit record | |
| nargs | numeric | the number of arguments to a socket call | |
| name | encoded | file name in avcs | |
| nametype | alphabet | kind of file operation being referenced | |
| net | alphanumeric | network MAC address | |
| new | numeric | value being set in feature | |
| new-chardev | encoded | new character device being assigned to vm | |
| new-disk | encoded | disk being added to vm | |
| new-enabled | numeric | new TTY audit enabled setting | |
| new-fs | encoded | file system being added to vm | |
| new_gid | numeric | new group ID being assigned | |
| new-level | alphanumeric | new run level | |
| new_lock | numeric | new value of feature lock | |
| new-log_passwd | numeric | new value for TTY password logging | |
| new-mem | numeric | new amount of memory in KB | |
| new-net | encoded | MAC address being assigned to vm | |
| new_pe | numeric | new process effective capability map | |
| new_pi | numeric | new process inherited capability map | |
| new_pp | numeric | new process permitted capability map | |
| new-range | alphanumeric | new SELinux range | |
| new-rng | encoded | device name of rng being added from a vm | |
| new-role | alphanumeric | new SELinux role | |
| new-seuser | alphanumeric | new SELinux user | |
| new-vcpu | numeric | new number of CPU cores | |
| nlnk-fam | numeric | netlink protocol number | |
| nlnk-grp | numeric | netlink group number | |
| nlnk-pid | numeric | pid of netlink packet sender | |
| oauid | numeric | object's login user ID | |
| obj | alphanumeric | lspp object context string | |
| obj_gid | numeric | group ID of object | |
| obj_uid | numeric | user ID of object | |
| oflag | numeric | open syscall flags | |
| ogid | numeric | file owner group ID | |
| ocomm | encoded | object's command line name | |
| old | numeric | present value of kernel feature | |
| old | numeric | old value | audit_enabled audit_backlog audit_failure value |
| old-auid | numeric | previous auid value | |
| old-chardev | encoded | present character device assigned to vm | |
| old-disk | encoded | disk being removed from vm | |
| old-enabled | numeric | present TTY audit enabled setting | |
| old_enforcing | numeric | old MAC enforcement status | |
| old-fs | encoded | file system being removed from vm | |
| old-level | alphanumeric | old run level | |
| old_lock | numeric | present value of feature lock | |
| old-log_passwd | numeric | present value for TTY password logging | |
| old-mem | numeric | present amount of memory in KB | |
| old-net | encoded | present MAC address assigned to vm | |
| old_pe | numeric | old process effective capability map | |
| old_pi | numeric | old process inherited capability map | |
| old_pp | numeric | old process permitted capability map | |
| old_prom | numeric | network promiscuity flag | |
| old-range | alphanumeric | present SELinux range | |
| old-rng | encoded | device name of rng being removed from a vm | |
| old-role | alphanumeric | present SELinux role | |
| old-ses | numeric | previous ses value | |
| old-seuser | alphanumeric | present SELinux user | |
| old_val | numeric | current value of SELinux boolean | |
| old-vcpu | numeric | present number of CPU cores | |
| op | alphanumeric | the operation being performed that is audited | |
| opid | numeric | object's process ID | |
| oses | numeric | object's session ID | |
| ouid | numeric | file owner user ID | |
| outif | numeric | out interface number | |
| parent | numeric | the inode number of the parent file | |
| path | encoded | file system path name | |
| per | numeric | linux personality | |
| perm | numeric | the file permission being used | |
| perm_mask | numeric | file permission mask that triggered a watch event | |
| permissive | numeric | SELinux is in permissive mode | |
| pfs | alphanumeric | perfect forward secrecy method | |
| pid | numeric | process ID | |
| ppid | numeric | parent process ID | |
| printer | alphanumeric | printer name | |
| prom | numeric | network promiscuity flag | |
| proctitle | encoded | process title and command line parameters | |
| proto | numeric | network protocol | |
| qbytes | numeric | ipc objects quantity of bytes | |
| range | alphanumeric | user's SE Linux range | |
| rdev | numeric | the device identifier (special files only) | |
| reason | alphanumeric | text string denoting a reason for the action | |
| removed | numeric | number of deleted files | |
| res | alphanumeric | result of the audited operation(success/fail) | |
| resrc | alphanumeric | resource being assigned | |
| result | alphanumeric | result of the audited operation(success/fail) | |
| role | alphanumeric | user's SELinux role | |
| rport | numeric | remote port number | |
| saddr | encoded | struct socket address structure | |
| sauid | numeric | sent login user ID | |
| scontext | alphanumeric | the subject's context string | |
| selected-context | alphanumeric | new MAC context assigned to session | |
| seperm | alphanumeric | SELinux permission being decided on | |
| seqno | numeric | sequence number | |
| seperms | alphabet | SELinux permissions being used | |
| seresult | alphabet | SELinux AVC decision granted/denied | |
| ses | numeric | login session ID | |
| seuser | alphanumeric | user's SE Linux user acct | |
| sgid | numeric | set group ID | |
| sig | numeric | signal number | |
| sigev_signo | numeric | signal number | |
| smac | numeric | local MAC address | |
| spid | numeric | sent process ID | |
| sport | numeric | local port number | |
| state | alphanumeric | audit daemon configuration resulting state | |
| subj | alphanumeric | lspp subject's context string | |
| success | alphanumeric | whether the syscall was successful or not | |
| suid | numeric | sent user ID | |
| syscall | numeric | syscall number in effect when the event occurred | |
| table | alphanumeric | netfilter table name | |
| tclass | alphanumeric | target's object classification | |
| tcontext | alphanumeric | the target's or object's context string | |
| terminal | alphanumeric | terminal name the user is running programs on | |
| tty | alphanumeric | tty udevice the user is running programs on | |
| type | alphanumeric | the audit record's type | |
| uid | numeric | user ID | |
| unit | alphanumeric | systemd unit | |
| uri | alphanumeric | URI pointing to a printer | |
| user | alphanumeric | account submitted for authentication | |
| uuid | alphanumeric | a UUID | |
| val | alphanumeric | generic value associated with the operation | |
| ver | numeric | audit daemon's version number | |
| virt | alphanumeric | kind of virtualization being referenced | |
| vm | encoded | virtual machine name | |
| vm-ctx | alphanumeric | the vm's context string | |
| vm-pid | numeric | vm's process ID | |
| watch | encoded | file name in a watch record |