@@ -19,9 +19,14 @@ Set to `true` to enable auditing on the node. The default value is `false`.
1919Specifies where audit logs are output. For example: `[ index, logfile ]`. The
2020default value is `logfile`, which puts the auditing events in a dedicated
2121file named `<clustername>_audit.log` on each node.
22+ +
2223You can also specify `index`, which puts the auditing events in an {es} index
2324that is prefixed with `.security_audit_log`. The index can reside on the same
24- cluster or a separate cluster.
25+ cluster or a separate cluster. deprecated[6.7.0, The outputs setting will be
26+ removed in 7.0 as there will only be one supported output type (`logfile`).
27+ Users who wish to store their audit information in an Elasticsearch index
28+ should write to the log file output, and a use a file ingestion component to
29+ index it into Elasticsearch.]
2530+
2631For backwards compatibility reasons, if you use the logfile output type, a
2732`<clustername>_access.log` file is also created. It contains the same
@@ -34,6 +39,8 @@ For more information, see <<configuring-logging-levels>>.
3439TIP: If the index is unavailable, it is possible for auditing events to
3540be lost. The `index` output type should therefore be used in conjunction with
3641the `logfile` output type and the latter should be the official record of events.
42+ This unreliability is an important reason for why the `index` output type was
43+ deprecated in 6.7.0 and will be removed in 7.0.
3744
3845--
3946
@@ -116,37 +123,39 @@ these values. If the event concerns several indices, some of which are
116123
117124[[index-audit-settings]]
118125==== Audit Log Indexing Configuration Settings
126+ deprecated[6.7.0, `xpack.security.audit.index` settings namespace refers to the
127+ `index` audit output type which is deprecated and will be removed in 7.0]
119128
120129`xpack.security.audit.index.bulk_size`::
121130Controls how many audit events are batched into a single write. The default
122- value is `1000`.
131+ value is `1000`. deprecated[6.7.0]
123132
124133`xpack.security.audit.index.flush_interval`::
125134Controls how often buffered events are flushed to the index. The default value
126- is `1s`.
135+ is `1s`. deprecated[6.7.0]
127136
128137`xpack.security.audit.index.rollover`::
129138Controls how often to roll over to a new index: `hourly`, `daily`, `weekly`, or
130- `monthly`. The default value is `daily`.
139+ `monthly`. The default value is `daily`. deprecated[6.7.0]
131140
132141`xpack.security.audit.index.events.include`::
133142Specifies the audit events to be indexed. The default value is
134143`anonymous_access_denied, authentication_failed, realm_authentication_failed, access_granted, access_denied, tampered_request, connection_granted, connection_denied, run_as_granted, run_as_denied`.
135144See {xpack-ref}/audit-event-types.html[Audit Entry Types] for the
136- complete list.
145+ complete list. deprecated[6.7.0]
137146
138147`xpack.security.audit.index.events.exclude`::
139148Excludes the specified auditing events from indexing. By default, no events are
140- excluded.
149+ excluded. deprecated[6.7.0]
141150
142151`xpack.security.audit.index.events.emit_request_body`::
143152Specifies whether to include the request body from REST requests on certain
144- event types such as `authentication_failed`. The default value is `false`.
153+ event types such as `authentication_failed`. The default value is `false`. deprecated[6.7.0]
145154
146155`xpack.security.audit.index.settings`::
147156Specifies settings for the indices that the events are stored in. For example,
148157the following configuration sets the number of shards and replicas to 1 for the
149- audit indices:
158+ audit indices: deprecated[6.7.0]
150159+
151160--
152161[source,yaml]
@@ -169,37 +178,39 @@ even if they are unspecified (i.e. left to defaults).
169178
170179[[remote-audit-settings]]
171180==== Remote Audit Log Indexing Configuration Settings
181+ deprecated[6.7.0, `xpack.security.audit.index` settings namespace refers to the
182+ `index` audit output type which is deprecated and will be removed in 7.0]
172183
173184To index audit events to a remote {es} cluster, you configure the following
174185`xpack.security.audit.index.client` settings:
175186
176187`xpack.security.audit.index.client.hosts`::
177188Specifies a comma-separated list of `host:port` pairs. These hosts should be
178- nodes in the remote cluster. If you are using default values for the
189+ nodes in the remote cluster. If you are using default values for the
179190<<common-network-settings,`transport.port`>> setting, you can omit the
180- `port` value. Otherwise, it must match the `transport.port` setting.
191+ `port` value. Otherwise, it must match the `transport.port` setting. deprecated[6.7.0]
181192
182193`xpack.security.audit.index.client.cluster.name`::
183- Specifies the name of the remote cluster.
194+ Specifies the name of the remote cluster. deprecated[6.7.0]
184195
185196`xpack.security.audit.index.client.xpack.security.user`::
186197Specifies the `username:password` pair that is used to authenticate with the
187- remote cluster. This user must have authority to create the `.security-audit`
188- index on the remote cluster.
198+ remote cluster. This user must have authority to create the `.security-audit`
199+ index on the remote cluster. deprecated[6.7.0]
189200
190- If the remote {es} cluster has Transport Layer Security (TLS/SSL) enabled, you
201+ If the remote {es} cluster has Transport Layer Security (TLS/SSL) enabled, you
191202must set the following setting to `true`:
192203
193204`xpack.security.audit.index.client.xpack.security.transport.ssl.enabled`::
194- Used to enable or disable TLS/SSL for the transport client that forwards audit
195- logs to the remote cluster. The default is `false`.
205+ Used to enable or disable TLS/SSL for the transport client that forwards audit
206+ logs to the remote cluster. The default is `false`. deprecated[6.7.0]
196207
197- You must also specify the information necessary to access certificates. See
198- <<auditing-tls-ssl-settings>>.
208+ You must also specify the information necessary to access certificates. See
209+ <<auditing-tls-ssl-settings>>.
199210
200211You can pass additional settings to the remote client by specifying them in the
201- `xpack.security.audit.index.client` namespace. For example, you can add
202- <<modules-transport,transport settings>> and
212+ `xpack.security.audit.index.client` namespace. deprecated[6.7.0] For example,
213+ you can add <<modules-transport,transport settings>> and
203214<<tcp-settings,advanced TCP settings>> in that namespace. To allow the remote
204215client to discover all of the nodes in the remote cluster you can specify the
205216`client.transport.sniff` setting:
0 commit comments