-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
generate-root command is not an auditable action #1142
Comments
I don't really follow what you mean by this statement: Thanks! |
The only reason I was alerted to an (authorized) invocation of the |
@jefferai any thoughts on auditing this events via the mounted audit backend log? The only way to know the unseal key holders generated a root token is by capturing log messages sent to stdout/stderr, which is not ideal.
|
@mwielgoszewski We have some work done already on a capability that will allow you to know which unseal key holders unsealed Vault (or generated a root token). Once this gets added, I think we will look at also generating audit log messages for these actions. I'm not yet sure if it will be possible for unseal (that may just have to stay in the log) but should be possible for generate-root since that is done against a live Vault server. I'll add it to the next milestone but may slip depending on when this code gets finished and merged. |
This is being tracked in #2244 |
Closing in favor of #2244 |
The
generate-root
command does not write any entries to the audit log when invoked. Your best chance of capturing this information is by ensuring log-level is set toinfo
on the servers. The following information should be captured upon first and subsequent invocations of the command:In some organizations, unseal key holders are not necessarily administrators or even operators of Vault, so knowing who among the unseal key holders performed the operation is pretty important.
The text was updated successfully, but these errors were encountered: