Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
audit
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Model registry
Operate
Environments
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
This is an archived project. Repository and other project resources are read-only.
Show more breadcrumbs
ai
audit
Commits
8f194a03
Commit
8f194a03
authored
11 years ago
by
ale
Browse files
Options
Downloads
Patches
Plain Diff
add README and license
parent
ad7e4ec5
No related branches found
No related tags found
No related merge requests found
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
COPYING
+20
-0
20 additions, 0 deletions
COPYING
README.rst
+61
-0
61 additions, 0 deletions
README.rst
with
81 additions
and
0 deletions
COPYING
0 → 100644
+
20
−
0
View file @
8f194a03
Copyright (c) 2014, <ale@incal.net>
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
This diff is collapsed.
Click to expand it.
README.rst
0 → 100644
+
61
−
0
View file @
8f194a03
+++++++++++++++
A/I Audit Suite
+++++++++++++++
This software implements a distributed collection framework for
*user audit* logs, which consist of high-level management events
related to specific user accounts. Such logs are generated at a
relatively low rate, but they are very important and must not be lost.
On the other hand, this data doesn't have to be real-time: some delay
in the collection pipeline is acceptable (after all, these logs are
primarily useful long-term).
An interface to query the audit database is also provided, with a very
simple *key = value* syntax.
Overview
========
An audit *message* is a schema-less JSON dictionary describing a
specific event. The meanings of its attributes are determined by
convention, but a message must include at least the *user*, *message*
and *stamp* attributes.
The design aims to be as lightweight as possible, since audit
functionality has to be added to many diverse applications. It also
needs to tolerate failure at any stage of the collection pipeline, to
avoid dependencies on highly-available network and databases. It works
as follows:
* When an audit client application wants to log a message, it tries
first to deliver it to the local audit daemon (via a UNIX socket).
If this fails, it will store the message in a spool directory on the
local filesystem.
* The local audit daemon, which runs on every machine where audit logs
are generated, is a lightweight daemon that implements the
store-and-forward retry logic: when it receives an incoming message,
it tries to send it to the main audit daemon, and if this fails, it
stores the message in the local spool directory. It also
periodically scans the spool directory and attempts to deliver
messages to the main audit daemon.
* The main audit daemon receives messages and stores them in the
database.
Authentication
==============
The suite is meant to be deployed along an X509-based authentication
infrastructure where a trusted Certification Authority assigns a
certificate to each machine. The local audit daemons will use the
machine certificates to authenticate themselves to the main audit
daemon, which will consider valid any certificate signed by the CA.
Client authorization is managed using UNIX permissions: the local
audit socket and spool directories are owned by the *audit* group, so
in order to allow an application to log audit events one should simply
add the user it's running as to the *audit* group.
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment