Main index | Section 1 | Options |
The options are as follows:
| |
Select all records. | |
| |
Select records that occurred after or on the given datetime. | |
| |
Select records that occurred before the given datetime. | |
| |
Select records matching the given audit classes specified as a comma separated list of audit flags. See audit_control(5) for a description of audit flags. | |
| |
Select records that occurred on a given date.
This option cannot be used with
| |
| |
Select records with the given effective user ID or name. | |
| |
Select records with the given effective group ID or name. | |
| |
Select records with the given real group ID or name. | |
| |
Select records having a subject token with matching ID, where ID is a process ID. | |
| |
Select records with the given event name or number. This option can be used more then once to select records of multiple event types. See audit_event(5) for a description of audit event names and numbers. | |
| |
file |
Select records containing path tokens, where the pathname matches
one of the comma delimited extended regular expression contained in
given specification.
Regular expressions which are prefixed with a tilde
(‘~’)
are excluded
from the search results.
These extended regular expressions are processed from left to right,
and a path will either be selected or deslected based on the first match.
Since commas are used to delimit the regular expressions, a backslash (‘\’) character should be used to escape the comma if it is a part of the search pattern. |
msgqid | |
Select records containing the given message queue ID. | |
pid | Select records containing the given process ID. |
semid | Select records containing the given semaphore ID. |
shmid | Select records containing the given shared memory ID. |
| |
Select records with the given real user ID or name. | |
| |
Select records with the given audit ID. | |
| |
Invert sense of matching, to select records that do not match. | |
| |
Select records from the given zone(s). zone is a glob for zones to match. | |
auditreduce -e root \ /var/audit/20031016184719.20031017122634
To select all setlogin(2) events from that log:
auditreduce -m AUE_SETLOGIN \ /var/audit/20031016184719.20031017122634
Output from the above command lines will typically be piped to a new trail file, or via standard output to the praudit(1) command.
Select all records containing a path token where the pathname contains /etc/master.passwd:
auditreduce -o file="/etc/master.passwd" \ /var/audit/20031016184719.20031017122634
Select all records containing path tokens, where the pathname is a TTY device:
auditreduce -o file="/dev/tty[a-zA-Z][0-9]+" \ /var/audit/20031016184719.20031017122634
Select all records containing path tokens, where the pathname is a TTY except for /dev/ttyp2:
auditreduce -o file="~/dev/ttyp2,/dev/tty[a-zA-Z][0-9]+" \ /var/audit/20031016184719.20031017122634
The Basic Security Module (BSM) interface to audit records and audit event stream format were defined by Sun Microsystems.
AUDITREDUCE (1) | February 20, 2020 |
Main index | Section 1 | Options |
Please direct any comments about this manual page service to Ben Bullock. Privacy policy.
“ | There are 10 types of people in the world: those who understand binary, and those who don't. | ” |