3c19f00a7f
This patch adds the right tags to each piece of metadata and corrects small errors found in the deployer notes. Closes-bug: 1595669 Change-Id: Ic04aaad85ebf111be5a0bdb01a350442fdea1433
519 B
519 B
---id: V-38634 status: implemented tag: auditd ---
The default action for security_max_log_file_action
on
Ubuntu 14.04, Ubuntu 16.04, and CentOS 7 is to rotate the logs. This
meets the STIG requirements and the Ansible task will ensure that the
secure default is maintained.
Use caution when changing this option. Certain values, like
SUSPEND
will cause the audit daemon to lock the machine
when the maximum size for a log file is reached. Review the audit
documentation carefully before making adjustments.