Skip to content

Conversation

@legrego
Copy link
Member

@legrego legrego commented Oct 25, 2021

Summary

Removes the ability to record legacy audit events.

Closes #82578

Followup tasks

  • Remove the legacy audit logger interface & dead code, and update downstream consumers
  • Create a new default location to audit logs, consistent with Elasticsearch
  • Update documentation

^ Some of these will be addressed in #116282.

Release notes

The legacy audit logger has been removed. Administrators who wish to audit Kibana events should instead enable the ECS-compliant audit logger.

@legrego
Copy link
Member Author

legrego commented Oct 25, 2021

@elasticmachine merge upstream

@legrego legrego changed the title Create default audit log appender Remove the legacy audit logger Oct 26, 2021
@legrego legrego added release_note:breaking Team:Security Platform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t// v8.0.0 Feature:Security/Audit Platform Security - Audit Logging feature labels Oct 26, 2021
@legrego legrego requested a review from jportner October 26, 2021 12:37
@legrego
Copy link
Member Author

legrego commented Oct 26, 2021

@jportner ready for a preliminary review while CI completes. As discussed, this isn't our ideal end-state, and we will have some bugs to resolve before the 8.0 release

config.audit.appender ??
({
type: 'rolling-file',
fileName: path.join(getDataPath(), 'audit.log'),
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This default appender writes to Kibana's data directory, as suggested in #82578 (comment).

The ideal solution is to write this data to a new logs directory. I propose tackling this in a followup (for 8.0) as this would require additional work to align with ES, and we don't have the luxury of time.

...data,
});
},
log: (eventType: string, message: string, data?: Record<string, any>) => {},
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The legacy audit logger is a no-op now. We should remove the function altogether in a followup. I opted not to do so here because that involves pinging a number of other teams for codeowner's review, and we don't have the luxury of time.

@jportner
Copy link
Contributor

I reviewed and it looks good. Will approve when this is marked ready for review 👍

@legrego legrego marked this pull request as ready for review October 26, 2021 16:22
@legrego legrego requested a review from a team as a code owner October 26, 2021 16:22
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

Copy link
Contributor

@jportner jportner left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚢

@legrego legrego added the backport:skip This PR does not require backporting label Oct 26, 2021
@legrego legrego enabled auto-merge (squash) October 26, 2021 16:33
@legrego legrego merged commit 5a9e170 into elastic:master Oct 26, 2021
@kibanamachine
Copy link
Contributor

💛 Build succeeded, but was flaky

Metrics [docs]

✅ unchanged

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@legrego legrego deleted the security/remove-legacy-audit-logger branch October 26, 2021 17:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport:skip This PR does not require backporting Feature:Security/Audit Platform Security - Audit Logging feature release_note:breaking Team:Security Platform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t// v8.0.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Breaking change] Audit logging events have changed

4 participants