This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Using the Kernel Log

Accessing permission errors in the kernel log with dmesg.

    Overview: The Dashboard and its review queues automatically process kernel log events alongside HeartSuite Core Secure log events. The kernel log (dmesg) serves as a fallback for advanced troubleshooting when events do not appear in the HeartSuite Core Secure activity log.

    Dashboard Handles Kernel Events Automatically

    The Dashboard’s review queues (Programs [p], File Access [f], Internet Access [i]) collect events from both the HeartSuite Core Secure activity log and the kernel log. There is no need to read dmesg output manually during routine allowlisting — all events appear in the appropriate review queue with full metadata.

    For details on the review process, see Allowlisting Basics.

    When to Use the Kernel Log Directly

    Depending on the distribution, some permission events may appear only in the kernel log rather than in /.hs/sys/hs-activity-log.txt. The kernel log is useful as a fallback when:

    • A program fails but no corresponding event appears in the HeartSuite Core Secure activity log
    • The HeartSuite Core Secure activity log has been cleared or rotated
    • Troubleshooting requires correlating HeartSuite Core Secure events with other kernel messages

    Reading HeartSuite Core Secure Messages from dmesg

    To extract only HeartSuite Core Secure-related messages from the kernel log:

    # dmesg | grep HEARTSUITE
    

    The output format matches the HeartSuite Core Secure activity log entries. For example:

    [Setup Notice - Add program to Allowlist?] Not Whitelisted: /usr/bin/nano
    [Setup Notice - Add to Allowlist?] File Access Attempt Logged: Program: /usr/bin/nano; File: /etc/ld.so.cache
    [Setup Notice - Add to Network Allowlist?] Network Connection Attempt Logged by /usr/bin/wget; IP: 45.60.22.168
    
    ScenarioRecommended approach
    Routine allowlistingDashboard and review queues
    Event missing from HeartSuite Core Secure logCheck dmesg for kernel-level entries
    Correlating with other kernel messagesdmesg with broader filtering
    Post-reboot investigationHeartSuite Core Secure activity log (persists across reboots)

    Allow several days to a week of observation in Setup Mode. Systemd timers, cron jobs, and infrequent services may not generate events until they run. The review queues accumulate these events automatically as they occur.