From 7d1ee63c33a4099df15b1dadd03f5646c6e2f298 Mon Sep 17 00:00:00 2001 From: dmmqz Date: Mon, 11 Aug 2025 17:04:45 +0200 Subject: [PATCH] audit2allow: remove duplicate page and move translations to common --- pages.es/{linux => common}/audit2allow.md | 0 pages.ko/{linux => common}/audit2allow.md | 0 pages/linux/audit2allow.md | 21 --------------------- 3 files changed, 21 deletions(-) rename pages.es/{linux => common}/audit2allow.md (100%) rename pages.ko/{linux => common}/audit2allow.md (100%) delete mode 100644 pages/linux/audit2allow.md diff --git a/pages.es/linux/audit2allow.md b/pages.es/common/audit2allow.md similarity index 100% rename from pages.es/linux/audit2allow.md rename to pages.es/common/audit2allow.md diff --git a/pages.ko/linux/audit2allow.md b/pages.ko/common/audit2allow.md similarity index 100% rename from pages.ko/linux/audit2allow.md rename to pages.ko/common/audit2allow.md diff --git a/pages/linux/audit2allow.md b/pages/linux/audit2allow.md deleted file mode 100644 index 60731054f1c5a2..00000000000000 --- a/pages/linux/audit2allow.md +++ /dev/null @@ -1,21 +0,0 @@ -# audit2allow - -> Create an SELinux local policy module to allow rules based on denied operations found in logs. -> Note: Use audit2allow with caution. Always review the generated policy before applying it, as it may allow excessive access. -> More information: . - -- Generate a local policy to allow access for all denied services: - -`sudo audit2allow {{[-a|--all]}} -M {{local_policy_name}}` - -- Generate a local policy module to grant access to a specific process/service/command from the audit logs: - -`sudo grep {{apache2}} /var/log/audit/audit.log | sudo audit2allow -M {{local_policy_name}}` - -- Inspect and review the Type Enforcement (.te) file for a local policy: - -`vim {{local_policy_name}}.te` - -- Install a local policy module: - -`sudo semodule {{[-i|--install]}} {{local_policy_name}}.pp`