Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common...

19
H17919 FAQ Dell EMC PowerScale: Common Questions Regarding Audit/Syslog Abstract This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and syslog. May 2020

Transcript of Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common...

Page 1: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

H17919

FAQ

Dell EMC PowerScale: Common Questions Regarding Audit/Syslog

Abstract This is to address some common questions or concerns regarding the capability

of Dell EMC™ PowerScale Audit log and syslog.

May 2020

Page 2: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

Revisions

H17919

Revisions

Date Description

August 2019 Initial release

Acknowledgements

This paper was produced by the following:

Author: [email protected]

The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this

publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose.

Use, copying, and distribution of any software described in this publication requires an applicable software license.

Copyright © 2019 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its

subsidiaries. Other trademarks may be trademarks of their respective owners. [5/18/2020] [FAQ] H17919

Page 3: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

Table of contents

H17919

Table of contents

Revisions............................................................................................................................................................................. 2

Acknowledgements ............................................................................................................................................................. 2

Table of contents ................................................................................................................................................................ 3

1 FAQ .............................................................................................................................................................................. 4

1.1 Does PowerScale have the capability to track the actions taken by individuals with root or administrative

privileges? .................................................................................................................................................................... 4

1.2 Does PowerScale have the capability to track the invalid access attempt?....................................................... 5

1.2.1 Invalid access attempt through SSH .................................................................................................................. 5

1.2.2 Invalid access through the protocol .................................................................................................................... 5

1.2.3 Invalid access through WebUI ............................................................................................................................ 6

1.3 Does PowerScale have the capability to track the elevation of privileges? ....................................................... 6

1.3.1 SMB – elevation of privileges through “run as root” ........................................................................................... 7

1.3.2 NFS – elevation of privileges through “map users to root” ................................................................................. 8

1.3.3 CLI – elevation of privileges through “sudo” ..................................................................................................... 10

1.4 Does PowerScale have the capability to track changes, additions, or deletions to individual accounts? ........ 12

1.4.1 Account creation ............................................................................................................................................... 12

1.4.2 Account modification ........................................................................................................................................ 12

1.4.3 Account deletion ............................................................................................................................................... 13

1.5 Does PowerScale have the capability to track initialization or stopping of audit logs? .................................... 13

1.6 Can you still track the protocol events when audit log has been stopped? ..................................................... 15

1.7 Will PowerScale capture the creation or deletion of system level objects? ..................................................... 15

1.8 Will PowerScale record the changes to time settings on critical systems? ...................................................... 16

1.9 Does PowerScale audit log support the parameters (Date, time, success/failure indication, the origination of

event, affected data and resources)? ......................................................................................................................... 17

A Technical support and resources ............................................................................................................................... 19

A.1 Related resources............................................................................................................................................. 19

Page 4: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

1 FAQ

1.1 Does PowerScale have the capability to track the actions taken by

individuals with root or administrative privileges? The audit log can record the majority of the activities as long as the operation is made by WebUI or CLI which

goes through PAPI. The operation can be classified into two categories:

• Configuration change

• Protocol access

A typical entry for audit log is as below, which can be viewed by the CLI command:

isi_audit_viewer -t config

isi_audit_viewer -t protocol

Typical audit log

Please note both userSID=S-1-22-1-0 and userID=0 indicate it is the root account. You can use isi auth

users view command to get the detailed account information from SID or UID:

Page 5: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

View account information by SID

1.2 Does PowerScale have the capability to track the invalid access

attempt? Yes, and it will be explained in the following three aspects

• Invalid access attempt through SSH

• Invalid access through the protocol

• Invalid access through WebUI

1.2.1 Invalid access attempt through SSH For the invalid access attempt through SSH, it’s logged under /var/log/auth.log:

Invalid access attempt through SSH

1.2.2 Invalid access through the protocol For the invalid access attempt through the protocol, it’s logged in the protocol access audit log. You can exam

the attempts by the following command:

Page 6: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

isi_audit_viewer -t protocol|grep logon

Audit log – invalid access through the protocol

The reasons for the invalid access can be examined through the field “ntStatus” in the protocol access

audit log file. The followings are some common code for “ntStatus”

• 3221225578 - wrong password

• 3221225572 - no such user

• 3221225586 - account disabled

1.2.3 Invalid access through WebUI For the invalid access attempt through WebUI, it’s logged under

/var/log/apache2/webui_httpd_error.log

Log – invalid access through WebUI

1.3 Does PowerScale have the capability to track the elevation of

privileges? Yes, audit log will show for the elevated users. It will be explained in the following three aspects:

Page 7: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

• SMB – elevation of privileges through “run as root”

• NFS – elevation of privileges through “map users to root”

• CLI – elevation of privileges through “sudo”

1.3.1 SMB – elevation of privileges through “run as root” In this example, I create a test SMB share and have allowed the account Vincent to run as root:

SMB configuration – run as root

I use Vincent account to access this SMB share and created a new folder. The following is the protocol

access audit log entry which is generated by isi_audit_viewer -t protocol:

Audit log for SMB – elevation of privileges

Please note both userSID=S-1-22-1-0 and userID=0 indicate it is the root account. You can use isi auth

users view command to get the detailed account information from SID or UID:

Page 8: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

View account information by SID

1.3.2 NFS – elevation of privileges through “map users to root” In this example, I create a test NFS export and map all the non-root users to root:

NFS configuration – map non-root users to root

I use Vincent account to access this SMB share and created a new folder. The following is the protocol

access audit log entry which is generated by isi_audit_viewer -t protocol:

Page 9: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

Audit log for NFS – elevation of privileges

Please note both userSID=S-1-22-1-0 and userID=0 indicate it is the root account. You can use isi auth

users view command to get the detailed account information from SID or UID:

Page 10: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

View account information by SID

1.3.3 CLI – elevation of privileges through “sudo” The following example shows a login in – Vincent to run sudo command:

Sudo command

The screenshot below is an example of the output from audit configuration change log by

isi_audit_viewer -t config:

Page 11: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

Audit log for sudo command

Please note UID=0 in this example represents the root account. However, unlike the example for SMB/NFS

permission elevation, the SID here represent the one behind the sudo command. In this case, it is Vincent:

Account behind sudo

Page 12: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

1.4 Does PowerScale have the capability to track changes, additions, or

deletions to individual accounts? If the accounts are created through isi auth users crate command, it will be recorded in the audit log

1.4.1 Account creation In the example below, I create a local user testABC by the command:

isi auth users create testABC

The following screenshot shows the corresponding audit entry by isi_audit_viewer -t config:

Audit log for account creation

1.4.2 Account modification In the example below, I add the email field to the local account testABC by the following command:

isi auth users modify testABC --email "[email protected]"

The following screenshot shows the corresponding audit entry by isi_audit_viewer -t config:

Page 13: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

Audit log for account modification

1.4.3 Account deletion In the example below, I remove the account testABC by the following command:

isi auth users delete testABC

The following screenshot shows the corresponding audit entry by isi_audit_viewer -t config:

Audit log for account deletion

1.5 Does PowerScale have the capability to track initialization or

stopping of audit logs? In PowerScale, there are two topics related to audit log:

Page 14: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

• Protocol access audit log

• Configuration change audit log

These two types of audit log can be started or stopped separately.

If you start or stop the protocol access audit log, this operation can be captured by the configuration change

audit log.

We can view the configuration change audit log through the following command:

isi_audit_viewer -t config

The following screenshot shows an example when the protocol access audit log is enabled:

Audit log for protocol audit enabled

Audit log for protocol audit disable

Start or stop the protocol access log cannot be tracked by the audit log itself.

Page 15: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

1.6 Can you still track the protocol events when audit log has been

stopped? No matter the audit log is enabled or disabled, you can query all the SMB protocol access information through

/var/log/lwiod.log.

In the following example, I disable the protocol access audit log and then create a new folder called “audit

test” in an SMB file share. In the /var/log/lwiod.log you can find the following entries.

Lwiod.log for SMB operations

For NFS, you can query /var/log/nfs.log for the information.

For HDFS, you can query /var/log/hdfs.log for the information.

Note, nfs.log and hdfs.log are slightly different from lwiod.log and less informative.

1.7 Will PowerScale capture the creation or deletion of system level

objects? If the operation is made by WebUI or CLI which goes through PAPI, they can all be easily tracked in audit log.

The following is an example of the audit log for creation and deletion a storage tier in the PowerScale

SmartPools:

Page 16: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

Creation and Deletion of storage tier

1.8 Will PowerScale record the changes to time settings on critical

systems? Yes, you can change the PowerScale cluster time through the WebUI/CLI/PAPI and they will all be recorded

by the audit log.

We can view the audit log through the following command:

isi_audit_viewer -t config

The following screenshot shows an example:

Page 17: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

Audit log for time change

1.9 Does PowerScale audit log support the parameters (Date, time,

success/failure indication, the origination of event, affected data and

resources)? PowerScale audit usually contains the following parameters and fields:

1. Timestamp

2. The user tokens of the person executing the command

a. User persona (Unix/Windows)

b. Primary group persona (Unix/Windows)

c. Supplemental group personas (Unix/Windows)

3. The protocol used to generate the command

a. 10 = PAPI / WebUI

b. 16 = Console

4. Access Zone that the command was executed against

5. Where the user connected from

6. The local node address where the command was executed

7. Command

8. Command arguments

9. Results

Figure 23 is an example of the output of audit log which is generated by the following command:

isi_audit_viewer -t config

In this example, there are two entries, one is entry 12th and the other is entry 15th. This first one represents

the action request which in this case is to change the cluster time. And the second one represents the action

response which in this case is status 204 meaning operation successful. These two entries are linked by the

Page 18: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

FAQ

H17919

id which in this example is “a220855c-8768-11e9-9368-000e1e5aa920”. So you can use the following

command to find the related entries in the audit log:

isi_audit_viewer -t config|grep “a220855c-8768-11e9-9368-000e1e5aa920”

Example of Audit parameters

Note: The above example is for Configure Audit Log. It’s very similar to Protocol Audit Log.

Page 19: Dell EMC PowerScale: Common Questions Regarding Audit/Syslog · This is to address some common questions or concerns regarding the capability of Dell EMC™ PowerScale Audit log and

Technical support and resources

H17919

A Technical support and resources

Dell.com/support is focused on meeting customer needs with proven services and support.

Storage technical documents and videos provide expertise that helps to ensure customer success on Dell

EMC storage platforms.

A.1 Related resources

Provide a list of documents and other assets that are referenced in the paper; include other resources that

may be helpful.