-
Notifications
You must be signed in to change notification settings - Fork 34
Vault: Revamp audit logging docs #631
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Rearrange the order of sections in the main Audit Logging documentation to keep related content closer together.
Remove the paragraph on blocking audit device failures. This content predates the rearchitecture of Vault's audit logging system and is no longer relevant. Vault's audit logging pipeline currently enforces a 10-second timeout for all audit devices.
Fix links to related concepts and API documentation. Add a note to recommend that users test the performance impact of their filtering rules in a non-production environment before deploying to production.
Vercel Previews Deployed
|
Broken Link CheckerNo broken links found! 🎉 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Worked through the best practices doc. Will pick up the remaining docs tomorrow.
You should configure monitoring and alerting on the health of your audit devices. | ||
|
||
Vault produces several [telemetry metrics](/vault/docs/internals/telemetry/metrics/audit) related to audit logging. You should especially monitor `vault.audit.log_request_failure`, `vault.audit.log_response_failure`, `vault.audit.{DEVICE}.log_request`, and `vault.audit.{DEVICE}.log_response` for spikes, which can indicate one or more audit devices failing. | ||
|
||
Additionally, you should configure monitoring and alerting specific to each type of audit device, such as available disk space, disk IOPS, and log rotation status for `file` audit devices. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You should configure monitoring and alerting on the health of your audit devices. | |
Vault produces several [telemetry metrics](/vault/docs/internals/telemetry/metrics/audit) related to audit logging. You should especially monitor `vault.audit.log_request_failure`, `vault.audit.log_response_failure`, `vault.audit.{DEVICE}.log_request`, and `vault.audit.{DEVICE}.log_response` for spikes, which can indicate one or more audit devices failing. | |
Additionally, you should configure monitoring and alerting specific to each type of audit device, such as available disk space, disk IOPS, and log rotation status for `file` audit devices. | |
We strongly recommend monitoring and alerting on the health of your audit | |
devices, with specific alerts for each type of audit device. For example, | |
alerting on available disk space, disk IOPS, and log rotation status for `file` | |
audit devices. | |
Vault produces several audit logging | |
[telemetry metrics](/vault/docs/internals/telemetry/metrics/audit) and we | |
recommend monitoring the following metrics for spikes, which can indicate one or | |
more audit devices failing: | |
- [`vault.audit.log_request_failure`](/vault/docs/internals/telemetry/metrics/audit#vault-audit-log_request_failure) | |
- [`vault.audit.log_response_failure`](/vault/docs/internals/telemetry/metrics/audit#vault-audit-log_response_failure) | |
- [`vault.audit.{DEVICE}.log_request`](/vault/docs/internals/telemetry/metrics/audit#vault-audit-device-log_request) | |
- [`vault.audit.{DEVICE}.log_response`](/vault/docs/internals/telemetry/metrics/audit#vault-audit-device-log_response) |
For each authentication backend and secrets engine mount you configure in Vault, you should evaluate which request and response attributes need *not* be [hashed](/vault/docs/audit#hashing-of-sensitive-values) in the audit logs. | ||
|
||
<Tip> | ||
Hashing should be left on for attributes that are sensitive (e.g., passwords, private keys) or that may be excessively large for your audit log. | ||
</Tip> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For each authentication backend and secrets engine mount you configure in Vault, you should evaluate which request and response attributes need *not* be [hashed](/vault/docs/audit#hashing-of-sensitive-values) in the audit logs. | |
<Tip> | |
Hashing should be left on for attributes that are sensitive (e.g., passwords, private keys) or that may be excessively large for your audit log. | |
</Tip> | |
We recommend [hashing](/vault/docs/audit#hashing-of-sensitive-values) for all | |
sensitive attributes (for example, passwords and private keys) and any attribute | |
may be excessively large for your audit log. | |
For all other attributes, we recommend reviewing each authentication backend and | |
secrets engine mount you configure in Vault to evaluate which request and | |
response attributes do not need hashing in the audit logs. |
Address feedback on writing style (hashicorpGH-631)
Revamp the documentation for Vault's audit logging. Changes include:
These changes cover most of VSM-226 and were reviewed internally by Engineering and Resident Architects/Engineers from the Professional Services team (see Google Docs history).
The changes also include minor fixes for the Audit Filtering docs page, which were identified in the course of Engineering review.