teacherspayteachers/linux-audit-exporterA Prometheus exporter for Linux Audit status.
This project is:
While this project is in ALPHA status, breaking changes may occur between minor versions, and will be announced in CHANGELOG.md and in the GitHub release notes.
The API surface area includes:
Golang 1.14+ is required to build the project.
Will run on any system that can run Go binaries, but will only export Linux Audit status when run from a Linux host. When run from a non-Linux host, it will export zero-ed metrics.
Additionally, requires:
CAP_AUDIT_READ)--host=pid in Docker, hostPID: true in KubernetesThe Linux audit system can be configured to log security-relevant events such as syscalls, and processed by auditd or commercial alternatives.
On high-throughput systems it may generate audit records at a faster pace than auditd (or equivalent) can consume. Depending on how Linux audit is configured, this can result in:
The linux-audit-exporter surfaces metrics meant to help operators monitor the status of the Linux audit system, and avoid these outcomes.
$ go build .
$ docker build .
$ linux-audit-exporter -h Export Linux audit status as Prometheus metrics Usage: linux-audit-exporter [flags] Flags: --health-path string health path (default "/healthz") -h, --help help for linux-audit-exporter --listen-address string listen address (default "0.0.0.0:9090") --metrics-path string metrics path (default "/metrics")
Run binary directly:
$ linux-audit-exporter
Or, use Docker image:
$ docker run -p 9090:9090 --privileged TeachersPayTeachers/linux-audit-exporter
$ curl localhost:9090/metrics | grep linux_audit
Docker images are published here.
$ docker run --privileged teacherspayteachers/linux-audit-exporter:latest
A Helm chart is available, which deploys linux-audit-exporter as a DaemonSet.
$ helm repo add tpt [***] $ helm install linux-audit-exporter tpt/linux-audit-exporter
The Helm chart code is located here.
When run from a Linux host with required privileges, will export Linux Audit status as Prometheus metrics. Here is a sample:
# HELP linux_audit_backlog Number of event records currently queued waiting for auditd to read them. # TYPE linux_audit_backlog gauge linux_audit_backlog 0 # HELP linux_audit_backlog_limit Number of outstanding audit buffers allowed. # TYPE linux_audit_backlog_limit gauge linux_audit_backlog_limit 5000 # HELP linux_audit_backlog_wait_time Time kernel waits when backlog limit is reached. # TYPE linux_audit_backlog_wait_time gauge linux_audit_backlog_wait_time *** # HELP linux_audit_backlog_wait_time_actual Total time spent by kernel waiting to queue audit events on backlog. # TYPE linux_audit_backlog_wait_time_actual gauge linux_audit_backlog_wait_time_actual 10 # HELP linux_audit_enabled Enabled flag. 0 = disabled. 1 = enabled. 2 = immutable. -1 = unknown. # TYPE linux_audit_enabled gauge linux_audit_enabled 1 # HELP linux_audit_failure Number of critical errors, such as transmission errors, backlog limit exceeded, etc. # TYPE linux_audit_failure gauge linux_audit_failure 0 # HELP linux_audit_lost Number of event records that have been discarded due to kernel audit queue overflowing. # TYPE linux_audit_lost gauge linux_audit_lost 0 # HELP linux_audit_rate_limit Limit of messages per second. A value of zero means no rate limit is applied. # TYPE linux_audit_rate_limit gauge linux_audit_rate_limit ***
printk and dmesgThe Linux audit system can be configured to log failures and lost
events with printk, which can usually be read with dmesg.
There is an (experimental, at time of this writing) user-space StatsD plugin.
Contributions are very welcome!
Please see CONTRIBUTING.md for information on how to contribute changes to this project.
When new commits are merged to the main branch, an internal process will
automatically create a new GitHub release, Docker image, and Helm chart if
there are any new fix: or feat: commits.
Note to Teachers Pay Teachers employees: see this internal wiki for information about this process.
New commits or pull requests to this project are automatically built, linted
and tested by GitHub Actions. See the
./github/workflows/ci.yaml file for the
configuration of CI actions.
MIT
探索更多轩辕镜像的使用方法,找到最适合您系统的配置方式
通过 Docker 登录认证访问私有仓库
在 Linux 系统配置镜像服务
在 Docker Desktop 配置镜像
Docker Compose 项目配置
Kubernetes 集群配置 Containerd
K3s 轻量级 Kubernetes 镜像加速
VS Code Dev Containers 配置
MacOS OrbStack 容器配置
在宝塔面板一键配置镜像
Synology 群晖 NAS 配置
飞牛 fnOS 系统配置镜像
极空间 NAS 系统配置服务
爱快 iKuai 路由系统配置
绿联 NAS 系统配置镜像
QNAP 威联通 NAS 配置
Podman 容器引擎配置
HPC 科学计算容器配置
ghcr、Quay、nvcr 等镜像仓库
无需登录使用专属域名
需要其他帮助?请查看我们的 常见问题Docker 镜像访问常见问题解答 或 提交工单
免费版仅支持 Docker Hub 访问,不承诺可用性和速度;专业版支持更多镜像源,保证可用性和稳定速度,提供优先客服响应。
专业版支持 docker.io、gcr.io、ghcr.io、registry.k8s.io、nvcr.io、quay.io、mcr.microsoft.com、docker.elastic.co 等;免费版仅支持 docker.io。
当返回 402 Payment Required 错误时,表示流量已耗尽,需要充值流量包以恢复服务。
通常由 Docker 版本过低导致,需要升级到 20.x 或更高版本以支持 V2 协议。
先检查 Docker 版本,版本过低则升级;版本正常则验证镜像信息是否正确。
使用 docker tag 命令为镜像打上新标签,去掉域名前缀,使镜像名称更简洁。
来自真实用户的反馈,见证轩辕镜像的优质服务