<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic linux_audit logs in Security</title>
    <link>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700374#M18143</link>
    <description>&lt;P&gt;My linux_audit logs increased after updating apps and causing license manager to go over limit. Anyone know a fix for this, I have looked for the stanzas on the backend but not able to find out where these logs are coming from.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Sep 2024 19:22:08 GMT</pubDate>
    <dc:creator>dude49</dc:creator>
    <dc:date>2024-09-27T19:22:08Z</dc:date>
    <item>
      <title>linux_audit logs</title>
      <link>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700374#M18143</link>
      <description>&lt;P&gt;My linux_audit logs increased after updating apps and causing license manager to go over limit. Anyone know a fix for this, I have looked for the stanzas on the backend but not able to find out where these logs are coming from.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 19:22:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700374#M18143</guid>
      <dc:creator>dude49</dc:creator>
      <dc:date>2024-09-27T19:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: linux_audit logs</title>
      <link>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700377#M18144</link>
      <description>&lt;P&gt;Go to one of the Linux servers that is reporting audit logs and run btool on the CLI.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;splunk btool --debug inputs list | grep audit&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;The output will include the name of the inputs.conf file where the input is defined.&amp;nbsp; Edit that file (or its peer in /local) to disable the input.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 19:36:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700377#M18144</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2024-09-27T19:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: linux_audit logs</title>
      <link>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700380#M18145</link>
      <description>&lt;P&gt;This is not strictly Splunk question.&lt;/P&gt;&lt;P&gt;If your systems started producing more audit events something must have changed. Probably either audit rules defined in your systems changed or the systems' behaviour changed so they report more events. It's something you need to resolve with your Linux admins. You could compare old data with new data to see what changed - whether there are more messages of some particular types or maybe new processes started geting "caught" by audit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 20:02:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700380#M18145</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-09-27T20:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: linux_audit logs</title>
      <link>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700409#M18146</link>
      <description>Or someone has added more servers under linux audit log collections.&lt;BR /&gt;Then best options is look when amount has increased and is node amount also increased on splunk side. If not then just look if then content on any individual nodes has increased and changed. Based on that you have more to discuss with you linux and/or splunk DS admins.</description>
      <pubDate>Sat, 28 Sep 2024 10:53:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700409#M18146</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2024-09-28T10:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: linux_audit logs</title>
      <link>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700552#M18148</link>
      <description>&lt;P&gt;So I did some research of when the uptick happened. It started last Monday before I starting upgrading Splunk. I blacklisted the host that were having the large amount of audit logs and reached out to the department for those host. Looks like it wasnt an app but servers possibly added or ingesting more due to a change. Will find out more once the department responds. Until then, will keep them blacklisted so that we stay under our license amount&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2024 14:30:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/linux-audit-logs/m-p/700552#M18148</guid>
      <dc:creator>dude49</dc:creator>
      <dc:date>2024-09-30T14:30:02Z</dc:date>
    </item>
  </channel>
</rss>

