<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH audit trail in Monitoring Splunk</title>
    <link>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105566#M1285</link>
    <description>&lt;P&gt;This is great, thank you!&lt;BR /&gt;
Can you post some examples of your rules?&lt;BR /&gt;
Did you manage to get all command arguments logged by auditd?&lt;/P&gt;</description>
    <pubDate>Tue, 08 Nov 2011 10:38:58 GMT</pubDate>
    <dc:creator>Simon</dc:creator>
    <dc:date>2011-11-08T10:38:58Z</dc:date>
    <item>
      <title>SSH audit trail</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105564#M1283</link>
      <description>&lt;P&gt;Dear splunkers &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;I'm aware this is less a Splunk question rather than a linux question, but did anybody of you implement kind of a SSH audit trail? I'm searching for a solution to get a command history of SSH (or even tty) logged-in users. I've found some shell wrappers like sudosh, rootsh, snoopy and so on but all of them have some disadvantages like only binary log format or it was not enough configurable (I don't want the commands output but its arguments).&lt;/P&gt;

&lt;P&gt;Thanks everyone for helping.&lt;BR /&gt;
Simon&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2011 21:06:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105564#M1283</guid>
      <dc:creator>Simon</dc:creator>
      <dc:date>2011-11-07T21:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSH audit trail</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105565#M1284</link>
      <description>&lt;P&gt;@simon Funny you should ask... I've been looking into this stuff myself recently&lt;/P&gt;

&lt;P&gt;For starters, set &lt;CODE&gt;LogLevel&lt;/CODE&gt; in &lt;CODE&gt;sshd_config&lt;/CODE&gt; to &lt;EM&gt;VERBOSE&lt;/EM&gt; instead of &lt;EM&gt;INFO&lt;/EM&gt; (usually the default). This will log the SSH key fingerprint the public key authentication is used, which can be very helpful if you have multiple people logging in to a shared account. (You'll have to use a Splunk transaction to associate the key with the user.)&lt;/P&gt;

&lt;P&gt;Secondly, you can use the Linux audit subsystem to actually audit the commands that are run by auditing the &lt;CODE&gt;execve&lt;/CODE&gt; system call. On RHEL and Ubuntu, there is an &lt;EM&gt;audit[d]&lt;/EM&gt; package; you probably want to use the &lt;EM&gt;system-config-audit&lt;/EM&gt; to set up the auditing rules.&lt;/P&gt;

&lt;P&gt;In your SSH PAM config, add the &lt;EM&gt;pam_loginuid&lt;/EM&gt; session module if it's not already there (RH has it by default); this sets the &lt;STRONG&gt;auid&lt;/STRONG&gt; attribute in the process to the UID of the user logging in, so even if you run &lt;CODE&gt;sudo&lt;/CODE&gt; the original login UID is retained.&lt;/P&gt;

&lt;P&gt;From there, you can use the &lt;CODE&gt;ausearch&lt;/CODE&gt; command to search in the binary log or enable syslog in &lt;CODE&gt;/etc/audisp/plugins.d/syslog.conf&lt;/CODE&gt;, which you can then index with Splunk.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2011 09:32:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105565#M1284</guid>
      <dc:creator>Wilcooley</dc:creator>
      <dc:date>2011-11-08T09:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSH audit trail</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105566#M1285</link>
      <description>&lt;P&gt;This is great, thank you!&lt;BR /&gt;
Can you post some examples of your rules?&lt;BR /&gt;
Did you manage to get all command arguments logged by auditd?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2011 10:38:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105566#M1285</guid>
      <dc:creator>Simon</dc:creator>
      <dc:date>2011-11-08T10:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSH audit trail</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105567#M1286</link>
      <description>&lt;P&gt;Check out ObserveIT SSH Audit, they have the best ssh recording solution, it records at the TTY level as well at the process level, therefore it will capture commands within scripts...&lt;BR /&gt;
Here is a short video that shows how it works&lt;BR /&gt;
&lt;A href="http://www.youtube.com/watch?v=G2M94IvTbe0&amp;amp;feature=player_embedded"&gt;http://www.youtube.com/watch?v=G2M94IvTbe0&amp;amp;feature=player_embedded&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;They also have a connector for splunk &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2011 19:55:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105567#M1286</guid>
      <dc:creator>gabyf2000</dc:creator>
      <dc:date>2011-11-24T19:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSH audit trail</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105568#M1287</link>
      <description>&lt;P&gt;Another solution for anyone who's interested:&lt;BR /&gt;
Starting from version 4.1.x, Bash starts supporting writing the bash history to syslog natively. &lt;BR /&gt;
Most recent Linux distribution releases, e.g. CentOS 6.x, include a bash version above 4.1. For older OS levels, I had to build an own bash 4.1 RPM, but this worked perfectly fine.&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jan 2012 10:49:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/SSH-audit-trail/m-p/105568#M1287</guid>
      <dc:creator>Simon</dc:creator>
      <dc:date>2012-01-15T10:49:52Z</dc:date>
    </item>
  </channel>
</rss>

