Vault
File audit device
The file
audit device writes audit logs to a file. This is a very simple audit
device: it appends logs to a file.
The device does not currently assist with any log rotation. There are very stable and feature-filled log rotation tools already, so we recommend using existing tools.
Sending a SIGHUP
to the Vault process will cause file
audit devices to close
and re-open their underlying file, which can assist with log rotation needs.
Examples
Enable at the default path:
$ vault audit enable file file_path=/var/log/vault_audit.log
Enable at a different path. It is possible to enable multiple copies of an audit device:
$ vault audit enable -path="vault_audit_1" file file_path=/home/user/vault_audit.log
Enable logs on stdout. This is useful when running in a container:
$ vault audit enable file file_path=stdout
Configuration
Note the difference between audit enable
command options and the file
backend
configuration options. Use vault audit enable -help
to see the command options.
The file
audit device supports the common configuration options documented on
the main Audit Devices page, and
these device-specific options:
file_path
(string: <required>)
- The path to where the audit log will be written. If a file already exists at the given path, the audit backend will append to it. There are some special keywords:mode
(string: "0600")
- A string containing an octal number representing the bit pattern for the file mode, similar tochmod
. Set to"0000"
to prevent Vault from modifying the file mode.
Log file rotation
To properly rotate Vault File Audit Device log files on BSD, Darwin, or Linux-based Vault servers, it is important that you configure your log rotation software to send the vault
process a signal hang up / SIGHUP
after each rotation of the log file.