LinuxCommandLibrary
GitHubF-DroidGoogle Play Store

sealert

Analyze and explain SELinux denial messages

TLDR

Analyze all recent SELinux denials
$ sudo sealert -a /var/log/audit/audit.log
copy
Lookup specific alert ID
$ sudo sealert -l alert_id
copy
Display summary of recent alerts
$ sudo sealert -b
copy
Display all alerts in HTML format
$ sudo sealert -a /var/log/audit/audit.log -H
copy

SYNOPSIS

sealert [options]

DESCRIPTION

sealert analyzes and explains SELinux AVC (Access Vector Cache) denial messages. It provides human-readable explanations of why access was denied and suggests solutions.Part of setroubleshoot, it helps administrators understand and resolve SELinux policy violations.

PARAMETERS

-a, --analyze file

Scan an audit log file for AVCs, analyze them, and write alerts to stdout.
-l, --lookupid id
Look up a specific alert by ID and write it to stdout. Use `*` to return all alerts.
-b, --browser
Launch the alert browser GUI.
-f, --fix uuid
Execute the fix command for the AVC with the given UUID. Requires --plugin.
-P, --plugin plugin
Specify the plugin name to use with --fix.
-H
Output alerts in HTML format instead of plain text (used with -l or -a).
-s, --service
Start the sealert D-Bus service (typically invoked by D-Bus).
-S, --noservice
Start sealert as a standalone application without the D-Bus service.
-u, --user user
Log on as the specified user.
-p, --password password
Set the user password.

CAVEATS

Requires SELinux audit logging to be enabled. Solutions are suggestions and should be reviewed before applying.

HISTORY

Part of setroubleshoot-server package, providing user-friendly SELinux troubleshooting.

SEE ALSO

Copied to clipboard
Kai