praudit - print contents of an audit trail file
praudit [-r|-s] [-lx] [-ddel] [-g filename] [-p filename] [filename]...
praudit reads the listed filenames (or standard
    input, if no filename is specified) and interprets the data as audit
    trail records as defined in audit.log(5). By default, times, user and
    group IDs (UIDs and GIDs, respectively) are converted
    to their ASCII representation. Record type and event fields are
    converted to their ASCII representation. A maximum of 100 audit files
    can be specified on the command line.
The following options are supported:
-ddel
Use del as the field delimiter instead of the
  default delimiter, which is the comma. If del has special meaning for
  the shell, it must be quoted. The maximum size of a delimiter is three
  characters. The delimiter is not meaningful and is not used when the -x
  option is specified.
-l
Print one line per record.
-r
Print records in their raw form. Times, UIDs,
  GIDs, record types, and events are displayed as integers. This option
  is useful when naming services are offline. The -r option and the
  -s option are exclusive. If both are used, a format usage error message
  is output.
-s
Display records in their short form. Numeric fields'
  ASCII equivalents are looked up by means of the sources specified in the
  
/etc/nsswitch.conf file (see 
nsswitch.conf(5)). All numeric
  fields are converted to ASCII and then displayed. The short 
ASCII
  representations for the record type and event fields are used. This option and
  the 
-r option are exclusive. If both are used, a format usage error
  message is output.
-x
Print records in XML form. Tags are included in the
  output to identify tokens and fields within tokens. Output begins with a valid
  XML prolog, which includes identification of the DTD which can be used to
  parse the XML.
-g filename
Read group entries from the specified file. GIDs
  referenced in the audit files will be resolved to group names using this file.
  GIDs not referenced in the specified file will be resolved by the host
  system. This option is useful when aggregating logs from multiple systems onto
  a single host for analysis, allowing GIDs to be resolved to the group
  names appropriate to the source of the audit file. To do this, copy the
  /etc/group file from the system from which the audit file originates
  and use that as the argument to the -g flag.
-p filename
Read passwd entries from the specified file. UIDs
  referenced in the audit files will be resolved to user names using this file.
  UIDs not referenced in the specified file will be resolved by the host
  system. This option is useful when aggregating logs from multiple systems onto
  a single host for analysis, allowing UIDs to be resolved to the user
  names appropriate to the source of the audit file. To do this, copy the
  /etc/passwd file from the system from which the audit file originates
  and use that as the argument to the -p flag.
/etc/security/audit_event
Audit event definition and class mappings.
/etc/security/audit_class
Audit class definitions.
/usr/share/lib/xml/dtd
Directory containing the versioned DTD file referenced in
  XML output, for example, adt_record.dtd.1.
/usr/share/lib/xml/style
Directory containing the versioned XSL file referenced in
  XML output, for example, adt_record.xsl.1.
See attributes(7) for descriptions of the following
    attributes:
  
    | ATTRIBUTE
      TYPE | ATTRIBUTE VALUE | 
  
    | Interface Stability | See below | 
The command stability is evolving. The output format is
  unstable.
audit(2), getauditflags(3BSM), getpwuid(3C),
    gethostbyaddr(3NSL), ethers(3SOCKET),
    getipnodebyaddr(3SOCKET), audit.log(5), audit_class(5),
    audit_event(5), group(5), nsswitch.conf(5),
    passwd(5), attributes(7), getent(8)