--- layout: "docs" page_title: "Audit Backend: Socket" sidebar_current: "docs-audit-socket" description: |- The "socket" audit backend writes audit writes to a TCP or UDP socket. --- # Audit Backend: Socket The `socket` audit backend writes to a TCP, UDP, or UNIX socket. ~> **Warning:** Due to the nature of the underlying protocols used in this backend there exists a case when the connection to a socket is lost a single audit entry could be omitted from the logs and the request will still succeed. Using this backend in conjunction with another audit backend will help to improve accuracy, but the socket backend should not be used if strong guarantees are needed for audit logs. ## Format Each line in the audit log is a JSON object. The `type` field specifies what type of object it is. Currently, only two types exist: `request` and `response`. The line contains all of the information for any given request and response. By default, all the sensitive information is first hashed before logging in the audit logs. ## Enabling #### Via the CLI Audit `socket` backend can be enabled by the following command. ``` $ vault audit-enable socket ``` Backend configuration options can also be provided from command-line. ``` $ vault audit-enable socket address="127.0.0.1:9090" socket_type="tcp" ``` Following are the configuration options available for the backend.
Backend configuration options