You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Changes the format of log events in the audit logfile.
It also changes the filename suffix from `_access` to `_audit`.
The new entry format is consistent with Elastic Common Schema.
Entries are formatted as JSON with no nested objects and field
names have a dotted syntax. Moreover, log entries themselves
are not spaced by commas and there is exactly one entry per line.
In addition, entry fields are ordered, unlike a typical JSON doc,
such that a human would not strain his eyes over jumbled
fields from one line to the other; the order is defined in the log4j2
properties file.
The implementation utilizes the log4j2's `StringMapMessage`.
This means that the application builds the log event as a map
and the log4j logic (the appender's layout) handle the format
internally. The layout, such as the set of printed fields and their
order, can be changed at runtime without restarting the node.
# "node.name" node name from the `elasticsearch.yml` settings
35
+
# "node.id" node id which should not change between cluster restarts
36
+
# "host.name" unresolved hostname of the local node
37
+
# "host.ip" the local bound ip (i.e. the ip listening for connections)
38
+
# "event.type" a received REST request is translated into one or more transport requests. This indicates which processing layer generated the event "rest" or "transport" (internal)
39
+
# "event.action" the name of the audited event, eg. "authentication_failed", "access_granted", "run_as_granted", etc.
40
+
# "user.name" the subject name as authenticated by a realm
41
+
# "user.run_by.name" the original authenticated subject name that is impersonating another one.
42
+
# "user.run_as.name" if this "event.action" is of a run_as type, this is the subject name to be impersonated as.
43
+
# "user.realm" the name of the realm that authenticated "user.name"
44
+
# "user.run_by.realm" the realm name of the impersonating subject ("user.run_by.name")
45
+
# "user.run_as.realm" if this "event.action" is of a run_as type, this is the realm name the impersonated user is looked up from
46
+
# "user.roles" the roles array of the user; these are the roles that are granting privileges
47
+
# "origin.type" it is "rest" if the event is originating (is in relation to) a REST request; possible other values are "transport" and "ip_filter"
48
+
# "origin.address" the remote address and port of the first network hop, i.e. a REST proxy or another cluster node
49
+
# "realm" name of a realm that has generated an "authentication_failed" or an "authentication_successful"; the subject is not yet authenticated
50
+
# "url.path" the URI component between the port and the query string; it is percent (URL) encoded
51
+
# "url.query" the URI component after the path and before the fragment; it is percent (URL) encoded
52
+
# "request.body" the content of the request body entity, JSON escaped
53
+
# "action" an action is the most granular operation that is authorized and this identifies it in a namespaced way (internal)
54
+
# "request.name" if the event is in connection to a transport message this is the name of the request class, similar to how rest requests are identified by the url path (internal)
55
+
# "indices" the array of indices that the "action" is acting upon
56
+
# "opaque_id" opaque value conveyed by the "X-Opaque-Id" request header
57
+
# "transport.profile" name of the transport profile in case this is a "connection_granted" or "connection_denied" event
58
+
# "rule" name of the applied rulee if the "origin.type" is "ip_filter"
59
+
# "event.category" fixed value "elasticsearch-audit"
0 commit comments