secure log is being populated every minute like this:
May 18 10:01:20 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:01:20 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:01:21 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:01:21 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:01:21 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:01:21 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:01:23 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:01:23 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:01:47 sasoa01p sshd[76487]: Accepted keyboard-interactive/pam for sas from 10.36.65.178 port 59682 ssh2
May 18 10:01:47 sasoa01p sshd[76487]: pam_tty_audit(sshd:session): changed status from 0 to 0
May 18 10:01:47 sasoa01p sshd[76487]: pam_unix(sshd:session): session opened for user sas by (uid=0)
May 18 10:01:53 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:01:53 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:01:54 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:01:54 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:01:54 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:01:54 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:01:56 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:01:56 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:02:26 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:02:26 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:02:27 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:02:27 sasoa01p su: pam_tty_audit(su:session): restored status to 1
May 18 10:02:27 sasoa01p su: pam_unix(su:session): session opened for user sas by (uid=0)
May 18 10:02:27 sasoa01p su: pam_tty_audit(su:session): changed status from 1 to 0
May 18 10:02:29 sasoa01p su: pam_unix(su:session): session closed for user sas
May 18 10:02:29 sasoa01p su: pam_tty_audit(su:session): restored status to 1
how do I stop these or investigate the cause of this,
I have checked crond for sas and root user and have not found much here,
also /etc/cron.d/ has just hourly and monthly jobs that should not be populating secure log on such high frequency,
please any ideas why this log is being populated so frequently and it is just wasting space with this consistent log.
Br, HS
@gwootton
Hi,
I have checked aureport -tty documentation link you sent.
So if auditing is only enabled for root user, would it help if I enable auditing for sas user as well?
then this flurry of logs might stop.
But I am unable to find pam.conf in my installation, and seems like contents of /etc/pam.d/ are alternatives to that, but I am not sure where I can enable that option so that sas auditing enable flag can be changed.
then these checks on session auditing might stop in secure log.
Br,
HS
The SAS Users Group for Administrators (SUGA) is open to all SAS administrators and architects who install, update, manage or maintain a SAS deployment.
SAS technical trainer Erin Winters shows you how to explore assets, create new data discovery agents, schedule data discovery agents, and much more.
Find more tutorials on the SAS Users YouTube channel.