This commit is contained in:
parent
139a2988a0
commit
f94ae7ae26
|
@ -4,20 +4,30 @@
|
|||
++++
|
||||
<titleabbrev>Auditing settings</titleabbrev>
|
||||
++++
|
||||
|
||||
[[auditing-settings-description]]
|
||||
// tag::auditing-settings-description-tag[]
|
||||
You configure security auditing settings in the `elasticsearch.yml` configuration file
|
||||
on each node in the cluster. For more information, see <<enable-audit-logging>>.
|
||||
// end::auditing-settings-description-tag[]
|
||||
You can use <<enable-audit-logging,audit logging>> to record security-related
|
||||
events, such as authentication failures, refused connections, and data-access
|
||||
events.
|
||||
|
||||
If configured, auditing settings must be set on every node in the cluster.
|
||||
Static settings, such as `xpack.security.audit.enabled`, must be configured in
|
||||
`elasticsearch.yml` on each node. For dynamic auditing settings, use the
|
||||
<<cluster-update-settings,cluster update settings API>> to ensure the setting is
|
||||
the same on all nodes.
|
||||
|
||||
[[general-audit-settings]]
|
||||
==== General Auditing Settings
|
||||
[[xpack-security-audit-enabled]]
|
||||
// tag::xpack-security-audit-enabled-tag[]
|
||||
`xpack.security.audit.enabled`::
|
||||
Set to `true` to enable auditing on the node. The default value is `false`.
|
||||
This puts the auditing events in a dedicated file named `<clustername>_audit.json`
|
||||
on each node.
|
||||
(<<static-cluster-setting,Static>>)
|
||||
Set to `true` to enable auditing on the node. The default value is `false`. This
|
||||
puts the auditing events in a dedicated file named `<clustername>_audit.json` on
|
||||
each node.
|
||||
+
|
||||
If enabled, this setting must be configured in `elasticsearch.yml` on all nodes
|
||||
in the cluster.
|
||||
// end::xpack-security-audit-enabled-tag[]
|
||||
|
||||
[[event-audit-settings]]
|
||||
|
@ -28,7 +38,8 @@ by using the following settings:
|
|||
|
||||
[[xpack-sa-lf-events-include]]
|
||||
// tag::xpack-sa-lf-events-include-tag[]
|
||||
`xpack.security.audit.logfile.events.include` {ess-icon}::
|
||||
`xpack.security.audit.logfile.events.include`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
Specifies which events to include in the auditing output. The default value is:
|
||||
`access_denied, access_granted, anonymous_access_denied, authentication_failed,
|
||||
connection_denied, tampered_request, run_as_denied, run_as_granted`.
|
||||
|
@ -36,14 +47,16 @@ connection_denied, tampered_request, run_as_denied, run_as_granted`.
|
|||
|
||||
[[xpack-sa-lf-events-exclude]]
|
||||
// tag::xpack-sa-lf-events-exclude-tag[]
|
||||
`xpack.security.audit.logfile.events.exclude` {ess-icon}::
|
||||
`xpack.security.audit.logfile.events.exclude`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
Excludes the specified events from the output. By default, no events are
|
||||
excluded.
|
||||
// end::xpack-sa-lf-events-exclude-tag[]
|
||||
|
||||
[[xpack-sa-lf-events-emit-request]]
|
||||
// tag::xpack-sa-lf-events-emit-request-tag[]
|
||||
`xpack.security.audit.logfile.events.emit_request_body` {ess-icon}::
|
||||
`xpack.security.audit.logfile.events.emit_request_body`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
Specifies whether to include the request body from REST requests on certain
|
||||
event types such as `authentication_failed`. The default value is `false`.
|
||||
+
|
||||
|
@ -59,28 +72,32 @@ audited in plain text when including the request body in audit events.
|
|||
|
||||
[[xpack-sa-lf-emit-node-name]]
|
||||
// tag::xpack-sa-lf-emit-node-name-tag[]
|
||||
`xpack.security.audit.logfile.emit_node_name` {ess-icon}::
|
||||
`xpack.security.audit.logfile.emit_node_name`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
Specifies whether to include the <<node.name,node name>> as a field in
|
||||
each audit event. The default value is `false`.
|
||||
// end::xpack-sa-lf-emit-node-name-tag[]
|
||||
|
||||
[[xpack-sa-lf-emit-node-host-address]]
|
||||
// tag::xpack-sa-lf-emit-node-host-address-tag[]
|
||||
`xpack.security.audit.logfile.emit_node_host_address` {ess-icon}::
|
||||
`xpack.security.audit.logfile.emit_node_host_address`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
Specifies whether to include the node's IP address as a field in each audit event.
|
||||
The default value is `false`.
|
||||
// end::xpack-sa-lf-emit-node-host-address-tag[]
|
||||
|
||||
[[xpack-sa-lf-emit-node-host-name]]
|
||||
// tag::xpack-sa-lf-emit-node-host-name-tag[]
|
||||
`xpack.security.audit.logfile.emit_node_host_name` {ess-icon}::
|
||||
`xpack.security.audit.logfile.emit_node_host_name`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
Specifies whether to include the node's host name as a field in each audit event.
|
||||
The default value is `false`.
|
||||
// end::xpack-sa-lf-emit-node-host-name-tag[]
|
||||
|
||||
[[xpack-sa-lf-emit-node-id]]
|
||||
// tag::xpack-sa-lf-emit-node-id-tag[]
|
||||
`xpack.security.audit.logfile.emit_node_id` {ess-icon}::
|
||||
`xpack.security.audit.logfile.emit_node_id`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
Specifies whether to include the node id as a field in each audit event.
|
||||
This is available for the new format only. That is to say, this information
|
||||
does not exist in the `<clustername>_access.log` file.
|
||||
|
@ -101,21 +118,24 @@ and not printed.
|
|||
|
||||
[[xpack-sa-lf-events-ignore-users]]
|
||||
// tag::xpack-sa-lf-events-ignore-users-tag[]
|
||||
`xpack.security.audit.logfile.events.ignore_filters.<policy_name>.users` {ess-icon}::
|
||||
`xpack.security.audit.logfile.events.ignore_filters.<policy_name>.users`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
A list of user names or wildcards. The specified policy will
|
||||
not print audit events for users matching these values.
|
||||
// end::xpack-sa-lf-events-ignore-users-tag[]
|
||||
|
||||
[[xpack-sa-lf-events-ignore-realms]]
|
||||
// tag::xpack-sa-lf-events-ignore-realms-tag[]
|
||||
`xpack.security.audit.logfile.events.ignore_filters.<policy_name>.realms` {ess-icon}::
|
||||
`xpack.security.audit.logfile.events.ignore_filters.<policy_name>.realms`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
A list of authentication realm names or wildcards. The specified policy will
|
||||
not print audit events for users in these realms.
|
||||
// end::xpack-sa-lf-events-ignore-realms-tag[]
|
||||
|
||||
[[xpack-sa-lf-events-ignore-roles]]
|
||||
// tag::xpack-sa-lf-events-ignore-roles-tag[]
|
||||
`xpack.security.audit.logfile.events.ignore_filters.<policy_name>.roles` {ess-icon}::
|
||||
`xpack.security.audit.logfile.events.ignore_filters.<policy_name>.roles`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
A list of role names or wildcards. The specified policy will
|
||||
not print audit events for users that have these roles. If the user has several
|
||||
roles, some of which are *not* covered by the policy, the policy will
|
||||
|
@ -124,7 +144,8 @@ roles, some of which are *not* covered by the policy, the policy will
|
|||
|
||||
[[xpack-sa-lf-events-ignore-indices]]
|
||||
// tag::xpack-sa-lf-events-ignore-indices-tag[]
|
||||
`xpack.security.audit.logfile.events.ignore_filters.<policy_name>.indices` {ess-icon}::
|
||||
`xpack.security.audit.logfile.events.ignore_filters.<policy_name>.indices`::
|
||||
(<<dynamic-cluster-setting,Dynamic>>)
|
||||
A list of index names or wildcards. The specified policy will
|
||||
not print audit events when all the indices in the event match
|
||||
these values. If the event concerns several indices, some of which are
|
||||
|
|
Loading…
Reference in New Issue