59 lines
2.3 KiB
Text
59 lines
2.3 KiB
Text
|
|
# veilor-os audisp-remote configuration template (DISABLED by default)
|
||
|
|
#
|
||
|
|
# IMPORTANT: enabling remote audit shipping leaks security events off-device.
|
||
|
|
# Only enable if you have a trusted log collector — the remote endpoint
|
||
|
|
# will receive every privileged syscall, file-watch hit, auth event, and
|
||
|
|
# sudoers/SSH config change recorded by auditd.
|
||
|
|
#
|
||
|
|
# To activate:
|
||
|
|
# 1. Set veilor-remote.conf `active = yes` (in /etc/audit/plugins.d/).
|
||
|
|
# 2. Copy this file to /etc/audisp/audisp-remote.conf (drop `.disabled`).
|
||
|
|
# 3. Edit `remote_server` + TLS settings below.
|
||
|
|
# 4. systemctl restart auditd
|
||
|
|
#
|
||
|
|
# Loki / Wazuh / Splunk integration paths:
|
||
|
|
#
|
||
|
|
# Loki - point remote_server at a syslog-to-Loki shim (promtail or
|
||
|
|
# vector with `syslog` source, format = "rfc5424"). Use TCP+TLS.
|
||
|
|
# Wazuh - run wazuh-agent locally; it pulls /var/log/audit/audit.log
|
||
|
|
# directly. In that case leave remote_server empty and rely on
|
||
|
|
# wazuh-agent's filebeat-style tailer instead of audisp-remote.
|
||
|
|
# Splunk - use a Splunk HEC bridge (rsyslog-omhttp or vector http sink).
|
||
|
|
# audisp-remote speaks plain syslog/TLS; it does not speak HEC
|
||
|
|
# natively.
|
||
|
|
|
||
|
|
# ---- transport ----
|
||
|
|
remote_server = logs.example.org
|
||
|
|
port = 60
|
||
|
|
transport = tcp # plain | tcp | krb5
|
||
|
|
queue_file = /var/spool/audit/remote.log
|
||
|
|
mode = immediate # immediate | forwarding
|
||
|
|
queue_depth = 10240
|
||
|
|
format = managed # managed | ascii
|
||
|
|
|
||
|
|
# ---- TLS (transport = tcp + use_libwrap=no recommended) ----
|
||
|
|
enable_krb5 = no
|
||
|
|
krb5_principal =
|
||
|
|
krb5_client_name = auditd
|
||
|
|
krb5_key_file = /etc/audit/audit.key
|
||
|
|
|
||
|
|
# ---- failure handling ----
|
||
|
|
network_failure_action = stop # ignore | syslog | exec | suspend | single | halt | stop
|
||
|
|
disk_low_action = syslog
|
||
|
|
disk_full_action = syslog
|
||
|
|
disk_error_action = syslog
|
||
|
|
remote_ending_action = reconnect
|
||
|
|
generic_error_action = syslog
|
||
|
|
generic_warning_action = syslog
|
||
|
|
overflow_action = syslog
|
||
|
|
|
||
|
|
# ---- heartbeat ----
|
||
|
|
heartbeat_timeout = 60
|
||
|
|
network_retry_time = 1
|
||
|
|
max_tries_per_record = 3
|
||
|
|
max_time_per_record = 5
|
||
|
|
|
||
|
|
# ---- formatting ----
|
||
|
|
# `managed` wraps each event in a syslog-RFC5424 header with veilor-os
|
||
|
|
# hostname + audit facility (LOG_AUTHPRIV). Loki/Splunk prefer this.
|