-
Notifications
You must be signed in to change notification settings - Fork 24.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
log4j2.properties should compress audit logs by default. maybe all logs. #63843
Comments
@wasserman can I work this? |
@somayaj I don't work for Elastic. What are you asking? |
Can i make the change as documented on the issue and create the PR.
…On Sun, Oct 18, 2020 at 9:11 AM wasserman ***@***.***> wrote:
@somayaj <https://github.com/somayaj> I don't work for Elastic. What are
you asking?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#63843 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AIRAZGPGOEFJOC3DCIKTPJTSLLZRLANCNFSM4STU7G5Q>
.
|
Pinging @elastic/es-core-infra (:Core/Infra/Logging) |
Pinging @elastic/es-security (:Security/Audit) |
@bytebilly confirmed with Security team that this was just an overlooked and audit logs should be compressed as well. |
@bytebilly security logs are at the moment rolled over by date. Do we still want this?
Zipping logs is most useful when combining this with Size based policy. I.e. new zip file every for 1GB of logs. cc @elastic/es-security |
audit logs should be compressed when rolling over due to size based triggering policy breaching 1GB. Total number of zipped files should be the same as for other log = 4 closes elastic#63843
Good questions @pgomulka.
In general I am not aware of any reason why we want to avoid size limits for these logs. I want to double check that we are ok doing that and we don't see it as a blocker. |
I would argue that since this is the audit trail, we should guarantee its best availability even if something fails (e.g. ingest into a monitoring cluster). Deleting old files can reduce the ability to investigate on security incidents. I had no feedback that it is a recurring problem, so I'd prefer to keep them. Does it make sense to you? |
agree -this is a breaking change so we can introduce it in v8 and deprecate in 7.x also agree, since this is security audit we can keep them all. |
audit logs should be compressed when rolling over due to size based triggering policy breaching 1GB. Files are not being deleted. closes #63843
When audit logs are enabled they can generate a lot of data. We have been fighting with disk space issues regularly. It seems like all logs should gzip in the rotation by default since it will create fires that people will respond to in various ways depending on their understanding of log4j or even Elastic. Of course people need to adjust the logging to suite their needs, but a sane default would be nice.
https://github.com/elastic/elasticsearch/blob/77661af2c5905b16884d1b0d5c7b7c9e86b7bee7/x-pack/plugin/core/src/main/config/log4j2.properties
Our solution was to use a block similar to this. Feel free to adopt it or share a recommendation.
Thanks!
The text was updated successfully, but these errors were encountered: