Blame SOURCES/scap-security-guide-0.1.64-add_warning_audit_rules_for_ospp-PR_9303.patch

bd46b7
From fc1b1304b1143c361fd33b440457816979a408d8 Mon Sep 17 00:00:00 2001
bd46b7
From: Watson Yuuma Sato <wsato@redhat.com>
bd46b7
Date: Tue, 9 Aug 2022 08:33:34 +0200
bd46b7
Subject: [PATCH 7/7] Merge pull request #9303 from vojtapolasek/rhbz1993822
bd46b7
bd46b7
Patch-name: scap-security-guide-0.1.64-add_warning_audit_rules_for_ospp-PR_9303.patch
bd46b7
Patch-status: add warning to audit_rules_for_ospp
bd46b7
---
bd46b7
 .../auditing/policy_rules/audit_rules_for_ospp/rule.yml  | 9 +++++++++
bd46b7
 1 file changed, 9 insertions(+)
bd46b7
bd46b7
diff --git a/linux_os/guide/system/auditing/policy_rules/audit_rules_for_ospp/rule.yml b/linux_os/guide/system/auditing/policy_rules/audit_rules_for_ospp/rule.yml
bd46b7
index 8461089f50..1cc1f231ff 100644
bd46b7
--- a/linux_os/guide/system/auditing/policy_rules/audit_rules_for_ospp/rule.yml
bd46b7
+++ b/linux_os/guide/system/auditing/policy_rules/audit_rules_for_ospp/rule.yml
bd46b7
@@ -67,3 +67,12 @@ fixtext: |-
bd46b7
     Then, run the following command to load all audit rules:
bd46b7
 
bd46b7
     $ sudo augenrules --load
bd46b7
+
bd46b7
+warnings:
bd46b7
+    - performance:
bd46b7
+        It might happen that Audit buffer configured by this rule is not large
bd46b7
+        enough for certain use cases. If that is the case, the buffer size can
bd46b7
+        be overridden by placing 
-b larger_buffer_size
into a file
bd46b7
+        within <tt>/etc/audit/rules.d</tt> directory, replacing
bd46b7
+        <tt>larger_file_size</tt> with the desired value. The file name should
bd46b7
+        start with a number higher than 10 and lower than 99.
bd46b7
-- 
bd46b7
2.37.2
bd46b7