37
37
## List of Tables
38
38
* [ Table 1: Revision] ( #table-1-revision )
39
39
* [ Table 2: Audit Rules Review] ( #table-2-audit-rules-review )
40
- * [ Table 3: Unt Test Cases] ( #table-3-unit-test-cases )
40
+ * [ Table 3: Unit Test Cases] ( #table-3-unit-test-cases )
41
41
* [ Table 4: System Test Cases] ( #table-4-system-test-cases )
42
42
43
43
## Revision
@@ -127,7 +127,7 @@ The database to be used is Config DB. A new AUDIT table will be added to the Con
127
127
key = AUDIT|config ; Audit configuration settings
128
128
; field = value
129
129
groupid = 1*255VCHAR ; Name of the audit rule group
130
- groupvalue = enabled / disabled ; Indicates whether the entire audit rule group is enabled or disabled
130
+ groupvalue = enable / disable ; Indicates whether the entire audit rule group is enabled or disabled
131
131
```
132
132
133
133
##### 3.3.1.2 Config DB JSON Sample
@@ -136,22 +136,22 @@ The predefined list of rules in Section 3.2 will be **enabled** by default, whil
136
136
{
137
137
"AUDIT": {
138
138
"config": {
139
- "critical_files": "enabled ",
140
- "dns_changes": "enabled ",
141
- "time_changes": "enabled ",
142
- "shutdown_reboot": "enabled ",
143
- "cron_changes": "enabled ",
144
- "modules_changes": "enabled ",
145
- "auth_logs": "enabled ",
146
- "bin_changes": "enabled ",
147
- "user_group_management": "enabled ",
148
- "file_deletion": "enabled ",
149
- "log_changes": "enabled ",
150
- "docker_changes": "enabled ",
151
- "process_audit": "enabled ",
152
- "network_activity": "enabled ",
153
- "socket_activity": "enabled ",
154
- "custom_audit": "disabled "
139
+ "critical_files": "enable ",
140
+ "dns_changes": "enable ",
141
+ "time_changes": "enable ",
142
+ "shutdown_reboot": "enable ",
143
+ "cron_changes": "enable ",
144
+ "modules_changes": "enable ",
145
+ "auth_logs": "enable ",
146
+ "bin_changes": "enable ",
147
+ "user_group_management": "enable ",
148
+ "file_deletion": "enable ",
149
+ "log_changes": "enable ",
150
+ "docker_changes": "enable ",
151
+ "process_audit": "enable ",
152
+ "network_activity": "enable ",
153
+ "socket_activity": "enable ",
154
+ "custom_audit": "disable "
155
155
}
156
156
}
157
157
}
@@ -165,37 +165,37 @@ Once the AUDIT table is populated in the Config DB, the corresponding entries ca
165
165
166
166
127.0.0.1:6379[4]> hgetall AUDIT|config
167
167
1) "critical_files"
168
- 2) "enabled "
168
+ 2) "enable "
169
169
3) "dns_changes"
170
- 4) "enabled "
170
+ 4) "enable "
171
171
5) "time_changes"
172
- 6) "enabled "
172
+ 6) "enable "
173
173
7) "shutdown_reboot"
174
- 8) "enabled "
174
+ 8) "enable "
175
175
9) "cron_changes"
176
- 10) "enabled "
176
+ 10) "enable "
177
177
11) "modules_changes"
178
- 12) "enabled "
178
+ 12) "enable "
179
179
13) "auth_logs"
180
- 14) "enabled "
180
+ 14) "enable "
181
181
15) "bin_changes"
182
- 16) "enabled "
182
+ 16) "enable "
183
183
17) "user_group_management"
184
- 18) "enabled "
184
+ 18) "enable "
185
185
19) "file_deletion"
186
- 20) "enabled "
186
+ 20) "enable "
187
187
21) "log_changes"
188
- 22) "enabled "
188
+ 22) "enable "
189
189
23) "docker_changes"
190
- 24) "enabled "
190
+ 24) "enable "
191
191
25) "process_audit"
192
- 26) "enabled "
192
+ 26) "enable "
193
193
27) "network_activity"
194
- 28) "enabled "
194
+ 28) "enable "
195
195
29) "socket_activity"
196
- 30) "enabled "
196
+ 30) "enable "
197
197
31) "custom_audit"
198
- 32) "disabled "
198
+ 32) "disable "
199
199
```
200
200
201
201
#### 3.3.2 YANG model
@@ -238,14 +238,14 @@ module sonic-audit {
238
238
239
239
leaf groupvalue {
240
240
type enumeration {
241
- enum "enabled " {
241
+ enum "enable " {
242
242
description "Audit rule is enabled.";
243
243
}
244
- enum "disabled " {
244
+ enum "disable " {
245
245
description "Audit rule is disabled.";
246
246
}
247
247
}
248
- description "Status of the audit rule group (enabled or disabled ).";
248
+ description "Status of the audit rule group (enable or disable ).";
249
249
}
250
250
}
251
251
/* end of list config */
0 commit comments