2015-04-20 05:59:39 +00:00
---
2020-01-18 00:18:09 +00:00
layout: docs
page_title: Audit Devices
description: Audit devices are mountable devices that log requests and responses in Vault.
2015-04-20 05:59:39 +00:00
---
2017-09-08 02:38:47 +00:00
# Audit Devices
2015-04-20 05:59:39 +00:00
2022-04-21 13:15:05 +00:00
Audit devices are the components in Vault that collectively keep a detailed log of all
2018-04-23 14:49:32 +00:00
requests and response to Vault. Because every operation with Vault is an API
2022-04-21 13:15:05 +00:00
request/response, when using a single audit device, the audit log contains _every authenticated_ interaction with
2018-04-23 14:49:32 +00:00
Vault, including errors.
2015-04-20 05:59:39 +00:00
2022-12-13 22:51:03 +00:00
## Enabling Multiple Devices
When multiple audit devices are enabled, Vault will attempt to send the audit
logs to all of them. This allows you to not only have redundant copies, but also
a way to check for data tampering in the logs themselves.
Vault considers a request to be successful if it can log to *at least* one
configured audit device (see: [Blocked Audit
Devices](/docs/audit#blocked-audit-devices) section below). Therefore in order
to build a complete picture of all audited actions, use the aggregate/union of
the logs from each audit device.
~> Note: It is **highly recommended** that you configure Vault to use multiple audit
devices. Audit failures can prevent Vault from servicing requests, so it is
important to provide at least one other device.
2022-04-21 13:15:05 +00:00
2017-09-08 02:38:47 +00:00
## Format
Each line in the audit log is a JSON object. The `type` field specifies what
type of object it is. Currently, only two types exist: `request` and `response`.
The line contains all of the information for any given request and response. By
default, all the sensitive information is first hashed before logging in the
audit logs.
2015-04-20 05:59:39 +00:00
## Sensitive Information
The audit logs contain the full request and response objects for every
2016-07-25 01:23:12 +00:00
interaction with Vault. The request and response can be matched utilizing a
2019-04-11 20:38:43 +00:00
unique identifier assigned to each request.
2021-09-28 18:44:46 +00:00
Most strings contained within requests and responses are hashed with a salt using HMAC-SHA256. The purpose of the hash is so that secrets aren't in plaintext within your audit logs. However, you're still able to check the value of secrets by generating HMACs yourself; this can be done with the audit device's hash function and salt by using the `/sys/audit-hash` API endpoint (see the documentation for more details).
2019-04-11 20:38:43 +00:00
2022-09-28 17:17:36 +00:00
~> Currently, only strings that come from JSON or returned in JSON are
2019-04-11 20:38:43 +00:00
HMAC'd. Other data types, like integers, booleans, and so on, are passed
2022-09-27 19:35:41 +00:00
through in plaintext. We recommend that all sensitive data be provided as string values
inside all JSON sent to Vault (i.e., that integer values are provided in quotes).
2015-04-20 05:59:39 +00:00
2021-09-28 18:44:46 +00:00
While most strings are hashed, Vault does make some exceptions, such as auth and secrets, and users can enable additional exceptions using the [secrets enable](/docs/commands/secrets/enable) command, and then tune it afterward.
**see also**:
[secrets tune](/docs/commands/secrets/tune)
[auth enable](/docs/commands/auth/enable)
[auth tune](/docs/commands/auth/tune)
2017-09-08 02:38:47 +00:00
## Enabling/Disabling Audit Devices
2015-04-20 05:59:39 +00:00
When a Vault server is first initialized, no auditing is enabled. Audit
2018-01-15 20:19:28 +00:00
devices must be enabled by a root user using `vault audit enable`.
2015-04-20 05:59:39 +00:00
2017-09-08 02:38:47 +00:00
When enabling an audit device, options can be passed to it to configure it.
For example, the command below enables the file audit device:
2015-04-20 05:59:39 +00:00
2020-05-21 17:18:17 +00:00
```shell-session
2017-09-08 02:38:47 +00:00
$ vault audit enable file file_path=/var/log/vault_audit.log
2015-04-20 05:59:39 +00:00
```
2017-01-19 02:43:29 +00:00
In the command above, we passed the "file_path" parameter to specify the path
2017-09-08 02:38:47 +00:00
where the audit log will be written to. Each audit device has its own
2015-04-20 05:59:39 +00:00
set of parameters. See the documentation to the left for more details.
2021-09-28 18:44:46 +00:00
~> Note: Audit device configuration is replicated to all nodes within a
cluster by default, and to performance/DR secondaries for Vault Enterprise clusters.
Before enabling an audit device, ensure that all nodes within the cluster(s)
will be able to successfully log to the audit device to avoid Vault being
blocked from serving requests.
2022-09-22 15:11:04 +00:00
An audit device can be limited to only within the node's cluster with the [`local`](/api-docs/system/audit#local) parameter.
2021-09-01 20:53:01 +00:00
2017-09-08 02:38:47 +00:00
When an audit device is disabled, it will stop receiving logs immediately.
2015-04-20 05:59:39 +00:00
The existing logs that it did store are untouched.
2017-09-08 02:38:47 +00:00
## Blocked Audit Devices
2015-04-20 05:59:39 +00:00
2022-08-26 13:19:49 +00:00
Audit device logs are critically important and ignoring auditing failures opens an avenue for attack. Vault will not respond to requests when no enabled audit devices can record them.
2015-04-20 05:59:39 +00:00
2022-08-26 13:19:49 +00:00
Vault can distinguish between two types of audit device failures.
2015-04-20 05:59:39 +00:00
2022-08-26 13:19:49 +00:00
- A blocking failure is one where an attempt to write to the audit device never completes. This is unlikely with a local disk device, but could occure with a network-based audit device.
2015-04-20 05:59:39 +00:00
2022-08-26 13:19:49 +00:00
- When multiple audit devices are enabled, if any of them fail in a non-blocking fashion, Vault requests can still complete successfully provided at least one audit device successfully writes the audit record. If any of the audit devices fail in a blocking fashion however, Vault requests will hang until the blocking is resolved.
In other words, Vault will not complete any requests until the blocked audit device can write.
2016-03-12 02:14:39 +00:00
2022-06-02 17:15:21 +00:00
## Tutorial
Refer to [Blocked Audit Devices](https://learn.hashicorp.com/tutorials/vault/blocked-audit-devices) for a step-by-step tutorial.
2016-03-12 02:14:39 +00:00
## API
2017-09-08 02:38:47 +00:00
Audit devices also have a full HTTP API. Please see the [Audit device API
2022-03-18 01:14:48 +00:00
docs](/api-docs/system/audit) for more details.