123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153 |
- [role="xpack"]
- [[auditing-settings]]
- === Auditing security settings
- ++++
- <titleabbrev>Auditing settings</titleabbrev>
- ++++
- [[auditing-settings-description]]
- You can use <<enable-audit-logging,audit logging>> to record security-related
- events, such as authentication failures, refused connections, and data-access
- events.
- If configured, auditing settings must be set on every node in the cluster.
- Static settings, such as `xpack.security.audit.enabled`, must be configured in
- `elasticsearch.yml` on each node. For dynamic auditing settings, use the
- <<cluster-update-settings,cluster update settings API>> to ensure the setting is
- the same on all nodes.
- [[general-audit-settings]]
- ==== General Auditing Settings
- [[xpack-security-audit-enabled]]
- // tag::xpack-security-audit-enabled-tag[]
- `xpack.security.audit.enabled`::
- (<<static-cluster-setting,Static>>)
- Set to `true` to enable auditing on the node. The default value is `false`. This
- puts the auditing events in a dedicated file named `<clustername>_audit.json` on
- each node.
- +
- If enabled, this setting must be configured in `elasticsearch.yml` on all nodes
- in the cluster.
- // end::xpack-security-audit-enabled-tag[]
- [[event-audit-settings]]
- ==== Audited Event Settings
- The events and some other information about what gets logged can be controlled
- by using the following settings:
- [[xpack-sa-lf-events-include]]
- // tag::xpack-sa-lf-events-include-tag[]
- `xpack.security.audit.logfile.events.include`::
- (<<dynamic-cluster-setting,Dynamic>>)
- Specifies which events to include in the auditing output. The default value is:
- `access_denied, access_granted, anonymous_access_denied, authentication_failed,
- connection_denied, tampered_request, run_as_denied, run_as_granted`.
- // end::xpack-sa-lf-events-include-tag[]
- [[xpack-sa-lf-events-exclude]]
- // tag::xpack-sa-lf-events-exclude-tag[]
- `xpack.security.audit.logfile.events.exclude`::
- (<<dynamic-cluster-setting,Dynamic>>)
- Excludes the specified events from the output. By default, no events are
- excluded.
- // end::xpack-sa-lf-events-exclude-tag[]
- [[xpack-sa-lf-events-emit-request]]
- // tag::xpack-sa-lf-events-emit-request-tag[]
- `xpack.security.audit.logfile.events.emit_request_body`::
- (<<dynamic-cluster-setting,Dynamic>>)
- Specifies whether to include the request body from REST requests on certain
- event types such as `authentication_failed`. The default value is `false`.
- +
- --
- IMPORTANT: No filtering is performed when auditing, so sensitive data may be
- audited in plain text when including the request body in audit events.
- --
- // end::xpack-sa-lf-events-emit-request-tag[]
- [[node-audit-settings]]
- ==== Local Node Info Settings
- [[xpack-sa-lf-emit-node-name]]
- // tag::xpack-sa-lf-emit-node-name-tag[]
- `xpack.security.audit.logfile.emit_node_name`::
- (<<dynamic-cluster-setting,Dynamic>>)
- Specifies whether to include the <<node-name,node name>> as a field in
- each audit event. The default value is `false`.
- // end::xpack-sa-lf-emit-node-name-tag[]
- [[xpack-sa-lf-emit-node-host-address]]
- // tag::xpack-sa-lf-emit-node-host-address-tag[]
- `xpack.security.audit.logfile.emit_node_host_address`::
- (<<dynamic-cluster-setting,Dynamic>>)
- Specifies whether to include the node's IP address as a field in each audit event.
- The default value is `false`.
- // end::xpack-sa-lf-emit-node-host-address-tag[]
- [[xpack-sa-lf-emit-node-host-name]]
- // tag::xpack-sa-lf-emit-node-host-name-tag[]
- `xpack.security.audit.logfile.emit_node_host_name`::
- (<<dynamic-cluster-setting,Dynamic>>)
- Specifies whether to include the node's host name as a field in each audit event.
- The default value is `false`.
- // end::xpack-sa-lf-emit-node-host-name-tag[]
- [[xpack-sa-lf-emit-node-id]]
- // tag::xpack-sa-lf-emit-node-id-tag[]
- `xpack.security.audit.logfile.emit_node_id`::
- (<<dynamic-cluster-setting,Dynamic>>)
- Specifies whether to include the node id as a field in each audit event.
- This is available for the new format only. That is to say, this information
- does not exist in the `<clustername>_access.log` file.
- Unlike <<node-name,node name>>, whose value might change if the administrator
- changes the setting in the config file, the node id will persist across cluster
- restarts and the administrator cannot change it.
- The default value is `true`.
- // end::xpack-sa-lf-emit-node-id-tag[]
- [[audit-event-ignore-policies]]
- ==== Audit Logfile Event Ignore Policies
- These settings affect the <<audit-log-ignore-policy,ignore policies>>
- that enable fine-grained control over which audit events are printed to the log file.
- All of the settings with the same policy name combine to form a single policy.
- If an event matches all of the conditions for a specific policy, it is ignored
- and not printed.
- [[xpack-sa-lf-events-ignore-users]]
- // tag::xpack-sa-lf-events-ignore-users-tag[]
- `xpack.security.audit.logfile.events.ignore_filters.<policy_name>.users`::
- (<<dynamic-cluster-setting,Dynamic>>)
- A list of user names or wildcards. The specified policy will
- not print audit events for users matching these values.
- // end::xpack-sa-lf-events-ignore-users-tag[]
- [[xpack-sa-lf-events-ignore-realms]]
- // tag::xpack-sa-lf-events-ignore-realms-tag[]
- `xpack.security.audit.logfile.events.ignore_filters.<policy_name>.realms`::
- (<<dynamic-cluster-setting,Dynamic>>)
- A list of authentication realm names or wildcards. The specified policy will
- not print audit events for users in these realms.
- // end::xpack-sa-lf-events-ignore-realms-tag[]
- [[xpack-sa-lf-events-ignore-roles]]
- // tag::xpack-sa-lf-events-ignore-roles-tag[]
- `xpack.security.audit.logfile.events.ignore_filters.<policy_name>.roles`::
- (<<dynamic-cluster-setting,Dynamic>>)
- A list of role names or wildcards. The specified policy will
- not print audit events for users that have these roles. If the user has several
- roles, some of which are *not* covered by the policy, the policy will
- *not* cover this event.
- // end::xpack-sa-lf-events-ignore-roles-tag[]
- [[xpack-sa-lf-events-ignore-indices]]
- // tag::xpack-sa-lf-events-ignore-indices-tag[]
- `xpack.security.audit.logfile.events.ignore_filters.<policy_name>.indices`::
- (<<dynamic-cluster-setting,Dynamic>>)
- A list of index names or wildcards. The specified policy will
- not print audit events when all the indices in the event match
- these values. If the event concerns several indices, some of which are
- *not* covered by the policy, the policy will *not* cover this event.
- // end::xpack-sa-lf-events-ignore-indices-tag[]
|