@@ -276,15 +276,19 @@ records from remote systems. The audit daemon may be linked with
276276tcp_wrappers. You may want to control access with an entry in the
277277hosts.allow and deny files. If this is deployed on a systemd based
278278OS, then you may need to adjust the 'After' directive. See the note in
279- the auditd.service file.
279+ the auditd.service file. Networking can be enabled by adding this
280+ option and sending auditd a SIGHUP. Changing the port or disabling
281+ networking requires restarting the daemon so that clients reconnect.
280282.TP
281283.I tcp_listen_queue
282284This is a numeric value which indicates how many pending (requested
283285but unaccepted) connections are allowed. The default is 5. Setting
284286this too small may cause connections to be rejected if too many hosts
285287start up at exactly the same time, such as after a power failure. This
286288setting is only used for aggregating servers. Clients logging to a remote
287- server should keep this commented out.
289+ server should keep this commented out. Changing this value while the
290+ daemon is running restarts the listener and drops any current
291+ connections.
288292.TP
289293.I tcp_max_per_addr
290294This is a numeric value which indicates how many concurrent connections from
@@ -318,7 +322,9 @@ If set to
318322.IR TCP " ,
319323only clear text tcp connections will be used. If set to
320324.IR KRB5 " ,
321- then Kerberos 5 will be used for authentication and encryption. The default value is TCP.
325+ then Kerberos 5 will be used for authentication and encryption. The
326+ default value is TCP. Changes to this option take effect only after
327+ restart so that clients can reconnect.
322328.TP
323329.I enable_krb5
324330This option is deprecated. Use the
0 commit comments