LinuxCommandLibrary

ausearch

Search and query audit log events

TLDR

Search for SELinux AVC denials

$ sudo ausearch -m avc
copy
Search by executable
$ sudo ausearch -c httpd
copy
Search by user
$ sudo ausearch -ui 1000
copy
Search recent events
$ sudo ausearch -ts recent
copy
Search failed logins
$ sudo ausearch -m user_login -sv no
copy
Search by file
$ sudo ausearch -f path/to/file
copy
Output raw format
$ sudo ausearch -m avc --raw
copy

SYNOPSIS

ausearch [OPTIONS]

DESCRIPTION

ausearch queries the Linux audit log for events. It can search by message type, user, process, file, time range, and other criteria, making it essential for security analysis and incident investigation.

PARAMETERS

-m, --message type

Search for specific message types (avc, user_login, etc.)
-c, --comm name
Search by command/executable name
-ui, --uid uid
Search by user ID
-f, --file path
Search for events related to a specific file
-ts, --start time
Start time for search (recent, today, or timestamp)
-te, --end time
End time for search
-sv, --success yes|no
Filter by success or failure
--raw
Output in raw format for further processing
-i, --interpret
Interpret numeric values (UIDs, syscalls, etc.)

CONFIGURATION

/etc/audit/auditd.conf

Main audit daemon configuration, controls log file location and retention policy.
/etc/audit/audit.rules
Defines which events are logged by the audit system. Determines what events are searchable.

CAVEATS

Requires root privileges to access audit logs. The audit daemon must be running and logging events. Large audit logs may slow searches; use time filters to narrow results.

HISTORY

ausearch is part of the audit package, providing search capabilities for the Linux Audit Framework.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community