@@ -14,38 +14,19 @@ file. For more information, see
14
14
15
15
`xpack.security.audit.enabled`::
16
16
Set to `true` to enable auditing on the node. The default value is `false`.
17
-
18
- `xpack.security.audit.outputs`::
19
- Specifies where audit logs are output. For example: `[ index, logfile ]`. The
20
- default value is `logfile`, which puts the auditing events in a dedicated
21
- file named `<clustername>_audit.log` on each node.
22
- You can also specify `index`, which puts the auditing events in an {es} index
23
- that is prefixed with `.security_audit_log`. The index can reside on the same
24
- cluster or a separate cluster.
25
- +
26
- For backwards compatibility reasons, if you use the logfile output type, a
27
- `<clustername>_access.log` file is also created. It contains the same
28
- information, but it uses the older (pre-6.5.0) formatting style.
29
- If the backwards compatible format is not required, it should be disabled.
30
- To do that, change its logger level to `off` in the `log4j2.properties` file.
31
- For more information, see <<configuring-logging-levels>>.
32
- +
33
- --
34
- TIP: If the index is unavailable, it is possible for auditing events to
35
- be lost. The `index` output type should therefore be used in conjunction with
36
- the `logfile` output type and the latter should be the official record of events.
37
-
38
- --
17
+ This puts the auditing events in a dedicated file named `<clustername>_audit.log`
18
+ on each node. For more information, see <<configuring-logging-levels>>.
39
19
40
20
[[event-audit-settings]]
41
21
==== Audited Event Settings
42
22
43
- The events and some other information about what gets logged can be
44
- controlled by using the following settings:
23
+ The events and some other information about what gets logged can be controlled
24
+ by using the following settings:
45
25
46
26
`xpack.security.audit.logfile.events.include`::
47
27
Specifies which events to include in the auditing output. The default value is:
48
- `access_denied, access_granted, anonymous_access_denied, authentication_failed, connection_denied, tampered_request, run_as_denied, run_as_granted`.
28
+ `access_denied, access_granted, anonymous_access_denied, authentication_failed,
29
+ connection_denied, tampered_request, run_as_denied, run_as_granted`.
49
30
50
31
`xpack.security.audit.logfile.events.exclude`::
51
32
Excludes the specified events from the output. By default, no events are
@@ -113,98 +94,3 @@ A list of index names or wildcards. The specified policy will
113
94
not print audit events when all the indices in the event match
114
95
these values. If the event concerns several indices, some of which are
115
96
*not* covered by the policy, the policy will *not* cover this event.
116
-
117
- [[index-audit-settings]]
118
- ==== Audit Log Indexing Configuration Settings
119
-
120
- `xpack.security.audit.index.bulk_size`::
121
- Controls how many audit events are batched into a single write. The default
122
- value is `1000`.
123
-
124
- `xpack.security.audit.index.flush_interval`::
125
- Controls how often buffered events are flushed to the index. The default value
126
- is `1s`.
127
-
128
- `xpack.security.audit.index.rollover`::
129
- Controls how often to roll over to a new index: `hourly`, `daily`, `weekly`, or
130
- `monthly`. The default value is `daily`.
131
-
132
- `xpack.security.audit.index.events.include`::
133
- Specifies the audit events to be indexed. The default value is
134
- `anonymous_access_denied, authentication_failed, realm_authentication_failed, access_granted, access_denied, tampered_request, connection_granted, connection_denied, run_as_granted, run_as_denied`.
135
- See {xpack-ref}/audit-event-types.html[Audit Entry Types] for the
136
- complete list.
137
-
138
- `xpack.security.audit.index.events.exclude`::
139
- Excludes the specified auditing events from indexing. By default, no events are
140
- excluded.
141
-
142
- `xpack.security.audit.index.events.emit_request_body`::
143
- Specifies whether to include the request body from REST requests on certain
144
- event types such as `authentication_failed`. The default value is `false`.
145
-
146
- `xpack.security.audit.index.settings`::
147
- Specifies settings for the indices that the events are stored in. For example,
148
- the following configuration sets the number of shards and replicas to 1 for the
149
- audit indices:
150
- +
151
- --
152
- [source,yaml]
153
- ----------------------------
154
- xpack.security.audit.index.settings:
155
- index:
156
- number_of_shards: 1
157
- number_of_replicas: 1
158
- ----------------------------
159
- --
160
- +
161
- --
162
- NOTE: These settings apply to the local audit indices, as well as to the
163
- <<remote-audit-settings, remote audit indices>>, but only if the remote cluster
164
- does *not* have {security-features} enabled or the {es} versions are different.
165
- If the remote cluster has {security-features} enabled and the versions coincide,
166
- the settings for the audit indices there will take precedence,
167
- even if they are unspecified (i.e. left to defaults).
168
- --
169
-
170
- [[remote-audit-settings]]
171
- ==== Remote Audit Log Indexing Configuration Settings
172
-
173
- To index audit events to a remote {es} cluster, you configure the following
174
- `xpack.security.audit.index.client` settings:
175
-
176
- `xpack.security.audit.index.client.hosts`::
177
- Specifies a comma-separated list of `host:port` pairs. These hosts should be
178
- nodes in the remote cluster. If you are using default values for the
179
- <<common-network-settings,`transport.port`>> setting, you can omit the
180
- `port` value. Otherwise, it must match the `transport.port` setting.
181
-
182
- `xpack.security.audit.index.client.cluster.name`::
183
- Specifies the name of the remote cluster.
184
-
185
- `xpack.security.audit.index.client.xpack.security.user`::
186
- Specifies the `username:password` pair that is used to authenticate with the
187
- remote cluster. This user must have authority to create the `.security-audit`
188
- index on the remote cluster.
189
-
190
- If the remote {es} cluster has Transport Layer Security (TLS/SSL) enabled, you
191
- must set the following setting to `true`:
192
-
193
- `xpack.security.audit.index.client.xpack.security.transport.ssl.enabled`::
194
- Used to enable or disable TLS/SSL for the transport client that forwards audit
195
- logs to the remote cluster. The default is `false`.
196
-
197
- You must also specify the information necessary to access certificates. See
198
- <<auditing-tls-ssl-settings>>.
199
-
200
- You can pass additional settings to the remote client by specifying them in the
201
- `xpack.security.audit.index.client` namespace. For example, you can add
202
- <<modules-transport,transport settings>> and
203
- <<tcp-settings,advanced TCP settings>> in that namespace. To allow the remote
204
- client to discover all of the nodes in the remote cluster you can specify the
205
- `client.transport.sniff` setting:
206
-
207
- [source,yaml]
208
- ----------------------------
209
- xpack.security.audit.index.client.transport.sniff: true
210
- ----------------------------
0 commit comments