2.1 KiB
layout | page_title | sidebar_current | description |
---|---|---|---|
docs | Audit Backend: Syslog | docs-audit-syslog | The "syslog" audit backend writes audit logs to syslog. |
Audit Backend: Syslog
The syslog
audit backend writes audit logs to syslog.
It currently does not support a configurable syslog destination, and always sends to the local agent. This backend is only supported on Unix systems, and should not be enabled if any standby Vault instances do not support it.
Format
Each line in the audit log is a JSON object. The type
field specifies what type of
object it is. Currently, only two types exist: request
and response
. The line contains
all of the information for any given request and response. By default, all the sensitive
information is first hashed before logging in the audit logs.
Enabling
Via the CLI
Audit syslog
backend can be enabled by the following command.
$ vault audit-enable syslog
Backend configuration options can also be provided from command-line.
$ vault audit-enable syslog tag="vault" facility="AUTH"
Following are the configuration options available for the backend.
- Backend configuration options
-
- facility optional The syslog facility to use. Defaults to `AUTH`.
- tag optional The syslog tag to use. Defaults to `vault`.
- log_raw optional A boolean, if set, logs the security sensitive information without hashing, in the raw format. Defaults to `false`.
- hmac_accessor optional A boolean, if set, enables the hashing of token accessor. Defaults to `true`. This option is useful only when `log_raw` is `false`.