open-vault/website/source/docs/audit/index.html.md
2015-04-19 22:59:39 -07:00

77 lines
3 KiB
Markdown

---
layout: "docs"
page_title: "Audit Backends"
sidebar_current: "docs-audit"
description: |-
Audit backends are mountable backends that log requests and responses in Vault.
---
# Audit Backends
Audit backends are the components in Vault that keep a detailed log
of all requests and response to Vault. Because _every_ operation with
Vault is an API request/response, the audit log contains _every_ interaction
with Vault, including errors.
Vault ships with multiple audit backends, depending on the location you want
the logs sent to. Multiple audit backends can be enabled and Vault will send
the audit logs to both. This allows you to not only have a redundant copy,
but also a second copy in case the first is tampered with.
## Sensitive Information
The audit logs contain the full request and response objects for every
interaction with Vault. The request contains all the parameters sent to
Vault and the response contains all the data in the response. This data
(both on the request and response) will often contain _secrets_ and other
sensitive information.
Therefore, extreme care should be taken to secure the audit logs that
are being kept. This level of detail is important for determining
the effect of an intrusion.
In the world of Vault, the effect of these secrets being in logs can
be effectively limited by making heavy use of dynamic keys, and the
ease of key rolling with Vault's leasing system.
~> **WARNING:** This section is incredibly important. If you are using
audit backends, then make sure you read the above section on sensitive
information within the logs.
## Enabling/Disabling Audit Backends
When a Vault server is first initialized, no auditing is enabled. Audit
backends must be enabled by a root user using `vault audit-enable`.
When enabling an audit backend, options can be passed to it to configure it.
For example, the command below enables the file audit backend:
```
$ vault audit-enable file path=/var/log/vault_audit.log
...
```
In the command above, we passed the "path" parameter to specify the path
where the audit log will be written to. Each audit backend has its own
set of parameters. See the documentation to the left for more details.
When an audit backend is disabled, it will stop receiving logs immediately.
The existing logs that it did store are untouched.
## Blocked Audit Backends
If there are any audit backends enabled, Vault requires that at least
one be able to persist the log before completing a Vault request.
If you have only one audit backend enabled, and it is blocking (network
block, etc.), then Vault will be _unresponsive_. Vault _will not_ complete
any requests until the audit backend can write.
If you have more than one audit backend, then Vault will complete the request
as long as one audit backend persists the log.
Vault will not respond to requests if audit backends are blocked because
audit logs are critically important and ignoring blocked requests opens
an avenue for attack. Be absolutely certain that your audit backends cannot
block.