Linux Auditing System

This section describes the Linux Auditing System containerized solution for StarlingX. The container-based solution aligns with the modular architecture approach of the StarlingX Platform product.

The Linux Auditing System helps system administrators track security violation events based on preconfigured audit rules. The events are recorded in a log file and the information in the log entries helps to detect misuse or unauthorized activities. Some examples of auditable events are:

  • file or directory access (Such as files/directories that were accessed, modified, executed, or attributes changed)

  • system calls (For example, useradd, time-related system calls)

  • commands run by a user (For example, a rule can be defined for every executable in the /bin directory and tracked per user.)

  • security events, such as failed login attempts

  • network access (The iptables and ebtables utilities can be configured to trigger audit events.)

The Linux Audit daemon, auditd, is the main component of the Linux Auditing System, and is responsible for writing the audit logs. For more information on auditd daemon configuration, see https://man7.org/linux/man-pages/man8/auditd.8.html.

To run auditd on StarlingX Platform, you must enable auditd in the kernel of StarlingX Platform hosts and then upload and apply the auditd system application.

Enable Auditd in the Kernel

The Linux Auditing System is disabled in the StarlingX kernel by default.

To enable auditd in the kernel of all hosts in the system, set the system service parameter audit to ‘1’ and apply the service-parameter change, using the following commands, executed on the active controller.

~(keystone_admin)]$ system service-parameter-modify platform kernel audit=1
~(keystone_admin)]$ system service-parameter-apply platform

To persist the service parameter change, all hosts need to be locked and unlocked, using the following commands for each host depending on the deployed configuration:

For AIO-SX deployments:

~(keystone_admin)$ system host-lock controller-0
~(keystone_admin)$ system host-unlock controller-0

For AIO-DX and Standards deployments, after controller-1 is locked/unlocked swact controller-0 to make controller-1 the active node. The next set of commands are executed on controller-0 node:

~(keystone_admin)$ system host-lock controller-1
~(keystone_admin)$ system host-unlock controller-1
~(keystone_admin)$ system host-swact controller-0

On controller-1, after controller-0 is locked/unlocked swact controller-1 to go back to controller-0 as the active node. The next set of commands are executed on controller-1 node:

~(keystone_admin)$ system host-lock controller-0
~(keystone_admin)$ system host-unlock controller-0
~(keystone_admin)$ system host-swact controller-1

For each worker node in the configuration execute the commands from controller-0:

~(keystone_admin)$ system host-lock worker-0
~(keystone_admin)$ system host-unlock worker-0

To verify if the grub kernel parameter audit was updated to ‘1’, for a particular host, ssh to the host, and check the cmdline parameters, for example:

~(keystone_admin)]$ cat /proc/cmdline BOOT_IMAGE=/vmlinuz-5.10.57-200.185.tis.el7.x86_64 root=UUID=e11d78a2-7e1c-4613-84c7-002647b1cf8d ro security_profile=standard module_blacklist=integrity,ima tboot=false crashkernel=512M biosdevname=0 console=ttyS0,115200 iommu=pt usbcore.autosuspend=-1 selinux=0 enforcing=0 nmi_watchdog=panic,1 softlockup_panic=1 softdog.soft_panic=1 intel_iommu=on user_namespace.enable=1 nopti nospectre_v2 nospectre_v1 hugepagesz=2M hugepages=0 default_hugepagesz=2M irqaffinity=2-3 rcu_nocbs=2-3 kthread_cpus=0-1 audit=1 audit_backlog_limit=8192

Note

Enabling auditd should only be done if the purpose is to start auditd in the container/pod using the process described in Start Auditd System Application. Otherwise, there will be unnecessary performance impact and the backlog events queue limit will eventually exceed, causing audit: kauditd hold queue overflow messages to be displayed.

Start Auditd System Application

Prerequisites

  • Set the audit grub kernel parameter to ‘1’.

  • The auditd container that runs the auditd daemon must be started by uploading and applying the audit-armada-app.

The auditd system application is installed as part of the software install or upgrade.

The auditd system application tarball can be found after installation in the /usr/local/share/applications/helm directory. The name of the tarball is auditd-<version>.tgz, for example, auditd-1.0-2.tgz.

Use the following commands to upload and apply the auditd system application:

~(keystone_admin)]$ system application-upload /usr/local/share/applications/helm/auditd-1.0-2.tgz
# check the app was uploaded

~(keystone_admin)]$ system application-show auditd
# if status is "uploaded" proceed with app apply

~(keystone_admin)]$ system application-apply auditd
# check the app was applied

~(keystone_admin)]$ system application-show auditd
# if successful, status will be "applied"

To check that auditd container/pod is created and running on each master and worker node, use the following command:

~(keystone_admin)]$ kubectl get pods -n kube-system -o wide | grep auditd

ns-auditd-9hgq5   1/1  Running 0 2m46s face::e95d:7b0:368d:55f8   compute-0     <none> <none>
ns-auditd-btww5   1/1  Running 1 2m46s face::2d8f:b75d:d511:81ef  compute-1     <none> <none>
ns-auditd-czsdf   1/1  Running 1 2m46s face::977:4894:111d:5bf0   compute-2     <none> <none>
ns-auditd-hs62t   1/1  Running 0 2m46s face::3                    controller-1  <none> <none>
ns-auditd-nn8jw   1/1  Running 0 2m46s face::2                    controller-0  <none> <none>

Auditd Configuration Overrides

The Auditd daemon specific configuration is available in the /etc/audit/auditd.conf file. For more information, see, https://man7.org/linux/man-pages/man5/auditd.conf.5.html.

Besides the auditd main configuration file auditd.conf, auditd uses audit rules configuration that is available in the /etc/audit/audit.rules file which defines what audit events are logged. For more information on how audit rules are configured, see https://linux.die.net/man/7/audit.rules.

In the StarlingX Platform containerized auditd solution, both configuration files have default settings that can be overwritten using Helm chart overrides.

The Helm chart overrides are applied using the following command:

~(keystone_admin)]$ system helm-override-update auditd auditd kube-system --reuse-values --values /home/sysadmin/<user_specific_config>.yaml

The <user_specific_config>.yaml defines the overrides that will apply either to the auditd.conf and/or to the audit.rules files.

Note

The default values for auditd.conf should be sufficient and you do not need to update them.

In rare cases, the following example describes how to update the default value with the desired value.

Example of user defined overrides file for auditd.conf:

auditdconf: |-
  ##########################################################################
  #
  # auditd.conf
  #
  ##########################################################################
  local_events = yes
  write_logs = yes
  log_file = /var/log/audit/audit.log
  log_group = root
  log_format = RAW
  flush = INCREMENTAL_ASYNC
  freq = 50
  max_log_file = 8
  num_logs = **8**
  priority_boost = 4
  disp_qos = lossy
  dispatcher = /sbin/audispd
  name_format = NONE
  ##name = mydomain
  max_log_file_action = IGNORE
  space_left = 75
  space_left_action = SYSLOG
  ##verify_email = yes
  ##action_mail_acct = root
  admin_space_left = 50
  admin_space_left_action = SYSLOG
  disk_full_action = SYSLOG
  disk_error_action = SYSLOG
  use_libwrap = yes
  ##tcp_listen_port = 60
  ##tcp_listen_queue = 5
  ##tcp_max_per_addr = 1
  ##tcp_client_ports = 1024-65535
  ##tcp_client_max_idle = 0
  enable_krb5 = no
  krb5_principal = auditd
  distribute_network = no

Example of user defined overrides file for audit.rules:

auditdrules: |-
  ## First rule - delete all
  -D

  ## Increase the buffers to survive stress events.
  ## Make this bigger for busy systems
  -b 8192

  ## Set failure mode to syslog
  -f 1

  -a always,exit -F arch=b32 -S init_module,finit_module,delete_module -F key=modules
  -a always,exit -F arch=b64 -S init_module,finit_module,delete_module -F key=modules

Note

The log rotation configuration in auditd.conf file must not be updated, and must use the default value, max_log_file_action = IGNORE, since the logrotate linux utility is used to manage auditd log rotation.

Apply the audit rules overrides using the following command:

~(keystone_admin)]$ system application-apply auditd

Check that application apply has completed successfully:

~(keystone_admin)]$ system application-show auditd

The Helm chart overrides system helm-override-update command, automatically applies the additional rules from the user provided yaml file to the audit.rules in the auditd container.

Similarly, configuration overrides can be applied to update the default configuration of auditd.conf using the system helm-override-update command.

Auditd logs

auditd logs can be viewed on the host in the /var/log/audit directory. Logs are generated by the auditd daemon running in the container and the logs record auditable events configured using the audit.rules file. Log rotation is automatically configured by the system.

Disable Auditd

You may decide to disable auditd for performance reasons. First, you must remove the auditd application. Then, you must set the kernel service parameter audit to ‘0’. These steps removes the auditd containers on all hosts and the auditd application.

Use the following system commands to disable auditd:

To remove the auditd application:

~(keystone_admin)]$ system application-remove auditd
~(keystone_admin)]$ system application-delete auditd

To verify that the application does not exist in the system:

~(keystone_admin)]$ system application-list |grep auditd

To set the kernel service parameter audit to ‘0’:

~(keystone_admin)]$ system service-parameter-modify platform kernel audit=0
~(keystone_admin)]$ system service-parameter-apply platform

To persist the kernel parameter change, all hosts need to be locked and unlocked:

~(keystone_admin)]$ system host-lock controller-0
~(keystone_admin)]$ system host-unlock controller-0