@@ -19,9 +19,14 @@ Set to `true` to enable auditing on the node. The default value is `false`.
19
19
Specifies where audit logs are output. For example: `[ index, logfile ]`. The
20
20
default value is `logfile`, which puts the auditing events in a dedicated
21
21
file named `<clustername>_audit.log` on each node.
22
+ +
22
23
You can also specify `index`, which puts the auditing events in an {es} index
23
24
that is prefixed with `.security_audit_log`. The index can reside on the same
24
- cluster or a separate cluster.
25
+ cluster or a separate cluster. deprecated[6.7.0, The outputs setting will be
26
+ removed in 7.0 as there will only be one supported output type (`logfile`).
27
+ Users who wish to store their audit information in an Elasticsearch index
28
+ should write to the log file output, and a use a file ingestion component to
29
+ index it into Elasticsearch.]
25
30
+
26
31
For backwards compatibility reasons, if you use the logfile output type, a
27
32
`<clustername>_access.log` file is also created. It contains the same
@@ -34,6 +39,8 @@ For more information, see <<configuring-logging-levels>>.
34
39
TIP: If the index is unavailable, it is possible for auditing events to
35
40
be lost. The `index` output type should therefore be used in conjunction with
36
41
the `logfile` output type and the latter should be the official record of events.
42
+ This unreliability is an important reason for why the `index` output type was
43
+ deprecated in 6.7.0 and will be removed in 7.0.
37
44
38
45
--
39
46
@@ -116,37 +123,39 @@ these values. If the event concerns several indices, some of which are
116
123
117
124
[[index-audit-settings]]
118
125
==== Audit Log Indexing Configuration Settings
126
+ deprecated[6.7.0, `xpack.security.audit.index` settings namespace refers to the
127
+ `index` audit output type which is deprecated and will be removed in 7.0]
119
128
120
129
`xpack.security.audit.index.bulk_size`::
121
130
Controls how many audit events are batched into a single write. The default
122
- value is `1000`.
131
+ value is `1000`. deprecated[6.7.0]
123
132
124
133
`xpack.security.audit.index.flush_interval`::
125
134
Controls how often buffered events are flushed to the index. The default value
126
- is `1s`.
135
+ is `1s`. deprecated[6.7.0]
127
136
128
137
`xpack.security.audit.index.rollover`::
129
138
Controls how often to roll over to a new index: `hourly`, `daily`, `weekly`, or
130
- `monthly`. The default value is `daily`.
139
+ `monthly`. The default value is `daily`. deprecated[6.7.0]
131
140
132
141
`xpack.security.audit.index.events.include`::
133
142
Specifies the audit events to be indexed. The default value is
134
143
`anonymous_access_denied, authentication_failed, realm_authentication_failed, access_granted, access_denied, tampered_request, connection_granted, connection_denied, run_as_granted, run_as_denied`.
135
144
See {xpack-ref}/audit-event-types.html[Audit Entry Types] for the
136
- complete list.
145
+ complete list. deprecated[6.7.0]
137
146
138
147
`xpack.security.audit.index.events.exclude`::
139
148
Excludes the specified auditing events from indexing. By default, no events are
140
- excluded.
149
+ excluded. deprecated[6.7.0]
141
150
142
151
`xpack.security.audit.index.events.emit_request_body`::
143
152
Specifies whether to include the request body from REST requests on certain
144
- event types such as `authentication_failed`. The default value is `false`.
153
+ event types such as `authentication_failed`. The default value is `false`. deprecated[6.7.0]
145
154
146
155
`xpack.security.audit.index.settings`::
147
156
Specifies settings for the indices that the events are stored in. For example,
148
157
the following configuration sets the number of shards and replicas to 1 for the
149
- audit indices:
158
+ audit indices: deprecated[6.7.0]
150
159
+
151
160
--
152
161
[source,yaml]
@@ -169,37 +178,39 @@ even if they are unspecified (i.e. left to defaults).
169
178
170
179
[[remote-audit-settings]]
171
180
==== Remote Audit Log Indexing Configuration Settings
181
+ deprecated[6.7.0, `xpack.security.audit.index` settings namespace refers to the
182
+ `index` audit output type which is deprecated and will be removed in 7.0]
172
183
173
184
To index audit events to a remote {es} cluster, you configure the following
174
185
`xpack.security.audit.index.client` settings:
175
186
176
187
`xpack.security.audit.index.client.hosts`::
177
188
Specifies a comma-separated list of `host:port` pairs. These hosts should be
178
- nodes in the remote cluster. If you are using default values for the
189
+ nodes in the remote cluster. If you are using default values for the
179
190
<<common-network-settings,`transport.port`>> setting, you can omit the
180
- `port` value. Otherwise, it must match the `transport.port` setting.
191
+ `port` value. Otherwise, it must match the `transport.port` setting. deprecated[6.7.0]
181
192
182
193
`xpack.security.audit.index.client.cluster.name`::
183
- Specifies the name of the remote cluster.
194
+ Specifies the name of the remote cluster. deprecated[6.7.0]
184
195
185
196
`xpack.security.audit.index.client.xpack.security.user`::
186
197
Specifies the `username:password` pair that is used to authenticate with the
187
- remote cluster. This user must have authority to create the `.security-audit`
188
- index on the remote cluster.
198
+ remote cluster. This user must have authority to create the `.security-audit`
199
+ index on the remote cluster. deprecated[6.7.0]
189
200
190
- If the remote {es} cluster has Transport Layer Security (TLS/SSL) enabled, you
201
+ If the remote {es} cluster has Transport Layer Security (TLS/SSL) enabled, you
191
202
must set the following setting to `true`:
192
203
193
204
`xpack.security.audit.index.client.xpack.security.transport.ssl.enabled`::
194
- Used to enable or disable TLS/SSL for the transport client that forwards audit
195
- logs to the remote cluster. The default is `false`.
205
+ Used to enable or disable TLS/SSL for the transport client that forwards audit
206
+ logs to the remote cluster. The default is `false`. deprecated[6.7.0]
196
207
197
- You must also specify the information necessary to access certificates. See
198
- <<auditing-tls-ssl-settings>>.
208
+ You must also specify the information necessary to access certificates. See
209
+ <<auditing-tls-ssl-settings>>.
199
210
200
211
You can pass additional settings to the remote client by specifying them in the
201
- `xpack.security.audit.index.client` namespace. For example, you can add
202
- <<modules-transport,transport settings>> and
212
+ `xpack.security.audit.index.client` namespace. deprecated[6.7.0] For example,
213
+ you can add <<modules-transport,transport settings>> and
203
214
<<tcp-settings,advanced TCP settings>> in that namespace. To allow the remote
204
215
client to discover all of the nodes in the remote cluster you can specify the
205
216
`client.transport.sniff` setting:
0 commit comments