Show Table of Contents
5.4. Usage
After a separate audit database directory has been configured, do the following:
- Create a text file containing a comma-separated list of the log files to be verified. The name of this file is referenced in the
AuditVerifycommand.For example, this file could belogListFilein the/etc/auditdirectory. The contents are the comma-separated list of audit logs to be verified, such as "auditlog.1213,auditlog.1214,auditlog.1215." - If the audit databases do not contain prefixes and are located in the user home directory, such as
/home/smith/.mozilla, and the signing certificate nickname is"auditsigningcert", theAuditVerifycommand is run as follows:AuditVerify -d ~jsmith/auitVerifyDir -n auditsigningcert -a /etc/audit/logListFile -P "" -v

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.