This repository was archived by the owner on Apr 3, 2021. It is now read-only.
Add support for unhexing values generated by auditd #2
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR adds an optional keyword flag
unhex,unhex_min_lengthandunhex_keysto AuditLogParser#parse which unhex's audit values. To use it, simply passunhex:trueas inAuditLogParser.parse(lines, unhex: true)unhexshould unhexing be applied?unhex_keysarray of lower-case string keys that should be unhexedunhex_min_lengththe minimum length of the value at which to match., useful for filtering outcertain keys that look like they can be unhexed, but are actually too short.
Why is this necessary?
Even when the audit library on Linux is configured to use enriched logs as below
It still generates some messages that contain hexed values, for example this proctitle line:
By enabling unhex, you can have this be converted to the correct string value: