-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
audit messages are flooding the console #220
Comments
are you saying we should use a different value for |
FTR |
I'd bring up that notably having some debugging messages printed on the console is useful even in production use cases. Specifically when interacting with clouds one of the primary ways of fetching information about a node that you cannot SSH into is using the built-in cloud APIs to fetch the console. This is especially important in the case of Ignition failures. I do agree that some of the audit spam is not optimal but that might be something we want to look into directly rather than lowering the entire console log level. |
👍 benjamin also mentioned that |
Sorry for the confusion, I am not suggesting to raise the defaults. At least not without further investigation first. This was just to track that I had some friction in getting the IP from the serial console due to audit spam, and that tweaking the sysctl helped. |
ok I'm working on setting up some sort of interactive TUI experience for our live ISO installer and having audit messages periodically print to the screen is not a good user experience. From what I can tell there are a few options to fix this issue:
I'm not sure how bad it would be to disable auditing ( |
Followup from IRC:
As a next step here, we are going to check this behavior with systemd folks. |
Tracked at systemd/systemd#15324. |
According to the above systemd ticket, we pinpointed this to a limitation / missing feature in the kernel audit subsystem. |
👍 - there is a lot of context in that ticket that provides useful historical information. Thanks for opening that issue @lucab and following up here. I'd propose we add |
It appears there might be some movement in linux-audit/audit-kernel#102. Meanwhile, if we ship auditd as a short-term workaround, we'll inevitably get objections once we try to remove it again. Would it make sense to write a small daemon that registers with the kernel using auditd's interface and then drops all messages? |
I did some digging. Container Linux ships On Fedora CoreOS, though, we're not shipping a way to load audit rules into the kernel, so we don't have a coherent audit solution right now. We should at least ship |
@bgilbert thanks for the trip in CL land. We have indeed a larger story to untangle wrt loading audit rules. I previously opened linux-audit/audit-userspace#111 in order to get support for fragments. I'm both wary of just sticking to current (Drifting away from this ticket, I think it'd makes sense to split auditd / augenrules / auditctl binary packages anyway. If nobody opposes, I'm going to ask for that in bugzilla) |
my $.02: let's just ship auditd and spend our time solving other problems. I don't feel super strongly about it though. |
I feel we should ship auditd, as many security compliance regimes require such functionality, so it'd end up layered otherwise in many cases. |
I'd be very wary of pulling in |
I agree. If we ship auditd I think we should rip out initscripts. |
coreos/fedora-coreos-config#340 should help us make sure it doesn't get pulled in. |
This need to fix this is increased right now because we are trying to support a workflow where a user can interactively do an install using the Live ISO and use TUI interfaces for configuring networking. The increased user experience provided by a TUI is completely lost if we have audit messages scrolling on the console every 10 seconds or so. I have opened a few change requests that are options we have for fixing this problem immediately. They are meant to spark discussion and hopefully get us to a point where this problem is fixed for the user trying to run a TUI and not have audit messages scrolling across their TUI canvas.
Maybe we can discuss these options (or any other viable short term option) in the meeting today to see if we can make progress. EDIT: added a 3rd option to the bulleted list. |
This change will cause the auditd daemon to get included in Fedora CoreOS and be enabled by default. This is a roundabout way of fixing [1] where we have audit messages coming to the primary console of our FCOS machines. This need for this is increased right now because we are trying to support a workflow where a user can interactively do an install using the Live ISO and use TUI interfaces for configuring networking. The increased user experience provided by a TUI is completely lost if we have audit messages scrolling on the console every 10 seconds or so. [1] coreos/fedora-coreos-tracker#220
This is the nuclear option to fix the issue [1] where we have audit messages coming to the console of our machines. We specifically need the messages to be disabled on the Live ISO because we are trying to support a workflow where a user can interactively do an install and use TUI interfaces for configuring networking. The increased user experience provided by a TUI is completely lost if we have audit messages scrolling on the console every 10 seconds or so. [1] coreos/fedora-coreos-tracker#220
We are trying to support a workflow where a user can interactively do an install and use TUI interfaces for configuring networking. The increased user experience provided by a TUI is completely lost if we have audit messages scrolling on the console every 10 seconds or so [1]. This change changes the kernel logging level on the console to be WARNING and not DEBUG. [1] coreos/fedora-coreos-tracker#220
I added a 3rd option to the bulleted list in #220 (comment) |
We talked about this in the community meeting today:
This is the overlay: lower kernel console logging level on Live ISO option from #220 (comment). I also agreed to open a ticket to discuss audit upstream features and packaging changes we'd like to see. It is here: #461 |
We are trying to support a workflow where a user can interactively do an install and use TUI interfaces for configuring networking. The increased user experience provided by a TUI is completely lost if we have audit messages scrolling on the console every 10 seconds or so [1]. This change changes the kernel logging level on the console to be WARNING and not DEBUG. [1] coreos/fedora-coreos-tracker#220
We are trying to support a workflow where a user can interactively do an install and use TUI interfaces for configuring networking. The increased user experience provided by a TUI is completely lost if we have audit messages scrolling on the console every 10 seconds or so [1]. This change changes the kernel logging level on the console to be WARNING and not DEBUG. [1] coreos/fedora-coreos-tracker#220
added our use case of audit messages in journald in #461 but thought I should elaborate the fact that we use the logging in journald for compliance purposes by using log delivery agents parsing journald[audit] messages. As there is no auditd.log on Container Linux, that is the only way for us to be able to parse audit messages. Bringing auditd would solve this as suggested but we haven't found an disadvantage of getting the logs from journald vs getting it from auditd.log in terms of compliance requirements. In addition to the above, FCOS currently does not ship auditctl and augenrules (unlike Container Linux) which prevents us using file integrity monitoring rules on FCOS. We would appreciate any estimation or timelines in concluding the above to have enough time to look into alternatives if this is unlikely to land on to FCOS before the Container Linux EOL dates. |
For those hitting this that don't care about a lowered kernel log level you can workaround with:
|
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
So this issue should now be solved in multiple ways. First, we now lower the printk level after boot. Second, in F39+ we're going to include auditd. I'll close this out now. |
On a freshly booted instance, the console is quickly filled with audit messages from the kernel. This makes spotting the
<INTERFACE>:<IPs>
harder, and any interactive console usage very messy.This seems to be caused by our console level being very low (7 is debug):
I am not sure where this is coming from, though. For the moment, it can be work-arounded with the following snippet in
/etc/sysctl.d/10-kernel-printk.conf
:OS info
The text was updated successfully, but these errors were encountered: