Thanks!
This has some interesting implications regarding attackers coming in through a
vulnerability in an organization's web services. I’ll have to compare what relevant
information I can capture in the audit logs vs. what is captured in web server logs.
Todd
 On Jul 30, 2020, at 11:29 AM, Steve Grubb <sgrubb(a)redhat.com>
wrote:
 
 On Thursday, July 30, 2020 1:54:09 PM EDT Todd Heberlein wrote:
> I’ve noticed that the httpd process on a CentOS 7.7 system I am working
> with is running with an Audit ID of -1. Example ID values are:
> 
>        auid=4294967295
>        uid=48
>        gid=48
>        ...
> 
> So if use the standard filter "-F auid!=-1” in the audit rules I do not see
> httpd activity.
> 
> Is this common?
 
 Yes, this is common. Most people are interested in the actions that people
 take on the machine rather than normal system functioning.
 
> How do I change the auid to something else, so I can capture the httpd
> activity in the audit log?
 
 A couple of ways. 
 1) remove the auid!=-1. That will get you all daemons.
 2) Use audit by executable rules:
 -a always,exit -F arch=b64 -S execve -F exe=/usr/sbin/httpd -F key=httpd-exec
 
 -Steve 
 
> Example audit line:
> 
> type=SYSCALL msg=audit(1596065566.721:31357): arch=c000003e syscall=2
> success=yes exit=15 a0=55a0a2d9b3c0 a1=80000 a2=0 a3=7ffe5d4d6720 items=1
> ppid=1130 pid=1253 auid=4294967295 uid=48 gid=48 euid=48 suid=48 fsuid=48
> egid=48 sgid=48 fsgid=48 tty=(none) ses=4294967295 comm="httpd"
> exe="/usr/sbin/httpd" key=(null)