Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport Structured Audit Logging #33894

99 changes: 96 additions & 3 deletions x-pack/plugin/core/src/main/config/log4j2.properties
Original file line number Diff line number Diff line change
@@ -1,9 +1,101 @@
appender.deprecated_audit_rolling.type = RollingFile
appender.deprecated_audit_rolling.name = deprecated_audit_rolling
appender.deprecated_audit_rolling.fileName = ${sys:es.logs.base_path}${sys:file.separator}${sys:es.logs.cluster_name}_access.log
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does this mean that when customers upgrade to say 6.5 version, they will have two logs being populated:
*_access.log and *_audit.log at the same time? Depending on whether the customer has done right steps to get away from old logging, it might result into two logs being populated (unknowingly constraining the system).
I think it would be better to keep old one enabled and the new one disabled and let customers go and move from the old appender to new appender.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@bizybot See the discussion starting here #31046 (comment)

Basically, Filebeat has to support whatever format we're defaulting too. So if we're not enabling the new appender in 6.x Filebeat will not use this in 6.x, so we might as well not port this to 6.x because Filebeat is the important reason we do this (sort of, the root reason is to get rid of the IndexAuditTrail, but we need Filebeat to consume or logs before we can do that).

And since we ❤️ our users, we don't want to break any systems they have set up right now that are consuming the present format. So, the compromise is to enable both of them.

appender.deprecated_audit_rolling.layout.type = PatternLayout
appender.deprecated_audit_rolling.layout.pattern = \
[%d{ISO8601}]\
%varsNotEmpty{ [%map{host.ip}]}\
%varsNotEmpty{ [%map{host.name}]}\
%varsNotEmpty{ [%map{node.name}]}\
\ [%map{event.type}]\
\ [%map{event.action}]\
\ \ \
%varsNotEmpty{realm=[%map{realm}], }\
origin_type=[%map{origin.type}]\
%varsNotEmpty{, origin_address=[%map{origin.address}]}\
%varsNotEmpty{, principal=[%map{user.name}]}\
%varsNotEmpty{, realm=[%map{user.realm}]}\
%varsNotEmpty{, run_by_principal=[%map{user.run_by.name}]}\
%varsNotEmpty{, run_as_principal=[%map{user.run_as.name}]}\
%varsNotEmpty{, run_by_realm=[%map{user.run_by.realm}]}\
%varsNotEmpty{, run_as_realm=[%map{user.run_as.realm}]}\
%varsNotEmpty{, roles=[%map{deprecated.user.roles}]}\
%varsNotEmpty{, action=[%map{action}]}\
%varsNotEmpty{, indices=[%map{deprecated.indices}]}\
%varsNotEmpty{, request=[%map{request.name}]}\
%varsNotEmpty{, transport_profile=[%map{transport.profile}]}\
%varsNotEmpty{, rule=[%map{rule}]}\
%varsNotEmpty{, uri=[%map{deprecated.uri}]}\
%varsNotEmpty{, opaque_id=[%map{opaque_id}]}\
%varsNotEmpty{, request_body=[%map{request.body}]}\
%n
appender.deprecated_audit_rolling.filePattern = ${sys:es.logs.base_path}${sys:file.separator}${sys:es.logs.cluster_name}_access-%d{yyyy-MM-dd}.log
appender.deprecated_audit_rolling.policies.type = Policies
appender.deprecated_audit_rolling.policies.time.type = TimeBasedTriggeringPolicy
appender.deprecated_audit_rolling.policies.time.interval = 1
appender.deprecated_audit_rolling.policies.time.modulate = true

appender.audit_rolling.type = RollingFile
bizybot marked this conversation as resolved.
Show resolved Hide resolved
appender.audit_rolling.name = audit_rolling
appender.audit_rolling.fileName = ${sys:es.logs.base_path}${sys:file.separator}${sys:es.logs.cluster_name}_access.log
appender.audit_rolling.fileName = ${sys:es.logs.base_path}${sys:file.separator}${sys:es.logs.cluster_name}_audit.log
appender.audit_rolling.layout.type = PatternLayout
appender.audit_rolling.layout.pattern = [%d{ISO8601}] %m%n
appender.audit_rolling.filePattern = ${sys:es.logs.base_path}${sys:file.separator}${sys:es.logs.cluster_name}_access-%d{yyyy-MM-dd}.log
appender.audit_rolling.layout.pattern = {\
"@timestamp":"%d{ISO8601}"\
%varsNotEmpty{, "node.name":"%enc{%map{node.name}}{JSON}"}\
%varsNotEmpty{, "node.id":"%enc{%map{node.id}}{JSON}"}\
%varsNotEmpty{, "host.name":"%enc{%map{host.name}}{JSON}"}\
%varsNotEmpty{, "host.ip":"%enc{%map{host.ip}}{JSON}"}\
%varsNotEmpty{, "event.type":"%enc{%map{event.type}}{JSON}"}\
%varsNotEmpty{, "event.action":"%enc{%map{event.action}}{JSON}"}\
%varsNotEmpty{, "user.name":"%enc{%map{user.name}}{JSON}"}\
%varsNotEmpty{, "user.run_by.name":"%enc{%map{user.run_by.name}}{JSON}"}\
%varsNotEmpty{, "user.run_as.name":"%enc{%map{user.run_as.name}}{JSON}"}\
%varsNotEmpty{, "user.realm":"%enc{%map{user.realm}}{JSON}"}\
%varsNotEmpty{, "user.run_by.realm":"%enc{%map{user.run_by.realm}}{JSON}"}\
%varsNotEmpty{, "user.run_as.realm":"%enc{%map{user.run_as.realm}}{JSON}"}\
%varsNotEmpty{, "user.roles":%map{user.roles}}\
%varsNotEmpty{, "origin.type":"%enc{%map{origin.type}}{JSON}"}\
%varsNotEmpty{, "origin.address":"%enc{%map{origin.address}}{JSON}"}\
%varsNotEmpty{, "realm":"%enc{%map{realm}}{JSON}"}\
%varsNotEmpty{, "url.path":"%enc{%map{url.path}}{JSON}"}\
%varsNotEmpty{, "url.query":"%enc{%map{url.query}}{JSON}"}\
%varsNotEmpty{, "request.body":"%enc{%map{request.body}}{JSON}"}\
%varsNotEmpty{, "action":"%enc{%map{action}}{JSON}"}\
%varsNotEmpty{, "request.name":"%enc{%map{request.name}}{JSON}"}\
%varsNotEmpty{, "indices":%map{indices}}\
%varsNotEmpty{, "opaque_id":"%enc{%map{opaque_id}}{JSON}"}\
%varsNotEmpty{, "transport.profile":"%enc{%map{transport.profile}}{JSON}"}\
%varsNotEmpty{, "rule":"%enc{%map{rule}}{JSON}"}\
%varsNotEmpty{, "event.category":"%enc{%map{event.category}}{JSON}"}\
}%n
# "node.name" node name from the `elasticsearch.yml` settings
# "node.id" node id which should not change between cluster restarts
# "host.name" unresolved hostname of the local node
# "host.ip" the local bound ip (i.e. the ip listening for connections)
# "event.type" a received REST request is translated into one or more transport requests. This indicates which processing layer generated the event "rest" or "transport" (internal)
# "event.action" the name of the audited event, eg. "authentication_failed", "access_granted", "run_as_granted", etc.
# "user.name" the subject name as authenticated by a realm
# "user.run_by.name" the original authenticated subject name that is impersonating another one.
# "user.run_as.name" if this "event.action" is of a run_as type, this is the subject name to be impersonated as.
# "user.realm" the name of the realm that authenticated "user.name"
# "user.run_by.realm" the realm name of the impersonating subject ("user.run_by.name")
# "user.run_as.realm" if this "event.action" is of a run_as type, this is the realm name the impersonated user is looked up from
# "user.roles" the roles array of the user; these are the roles that are granting privileges
# "origin.type" it is "rest" if the event is originating (is in relation to) a REST request; possible other values are "transport" and "ip_filter"
# "origin.address" the remote address and port of the first network hop, i.e. a REST proxy or another cluster node
# "realm" name of a realm that has generated an "authentication_failed" or an "authentication_successful"; the subject is not yet authenticated
# "url.path" the URI component between the port and the query string; it is percent (URL) encoded
# "url.query" the URI component after the path and before the fragment; it is percent (URL) encoded
# "request.body" the content of the request body entity, JSON escaped
# "action" an action is the most granular operation that is authorized and this identifies it in a namespaced way (internal)
# "request.name" if the event is in connection to a transport message this is the name of the request class, similar to how rest requests are identified by the url path (internal)
# "indices" the array of indices that the "action" is acting upon
# "opaque_id" opaque value conveyed by the "X-Opaque-Id" request header
# "transport.profile" name of the transport profile in case this is a "connection_granted" or "connection_denied" event
# "rule" name of the applied rulee if the "origin.type" is "ip_filter"
# "event.category" fixed value "elasticsearch-audit"

appender.audit_rolling.filePattern = ${sys:es.logs.base_path}${sys:file.separator}${sys:es.logs.cluster_name}_audit-%d{yyyy-MM-dd}.log
appender.audit_rolling.policies.type = Policies
appender.audit_rolling.policies.time.type = TimeBasedTriggeringPolicy
appender.audit_rolling.policies.time.interval = 1
Expand All @@ -12,6 +104,7 @@ appender.audit_rolling.policies.time.modulate = true
logger.xpack_security_audit_logfile.name = org.elasticsearch.xpack.security.audit.logfile.LoggingAuditTrail
logger.xpack_security_audit_logfile.level = info
logger.xpack_security_audit_logfile.appenderRef.audit_rolling.ref = audit_rolling
logger.xpack_security_audit_logfile.appenderRef.deprecated_audit_rolling.ref = deprecated_audit_rolling
logger.xpack_security_audit_logfile.additivity = false

logger.xmlsig.name = org.apache.xml.security.signature.XMLSignature
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,45 +8,134 @@
import org.apache.logging.log4j.Level;
import org.apache.logging.log4j.LogManager;
import org.apache.logging.log4j.Logger;
import org.apache.logging.log4j.core.Layout;
import org.apache.logging.log4j.core.LogEvent;
import org.apache.logging.log4j.core.LoggerContext;
import org.apache.logging.log4j.core.StringLayout;
import org.apache.logging.log4j.core.appender.AbstractAppender;
import org.apache.logging.log4j.core.config.Configuration;
import org.apache.logging.log4j.core.config.LoggerConfig;
import org.apache.logging.log4j.core.filter.RegexFilter;
import org.elasticsearch.common.Nullable;
import org.elasticsearch.common.logging.ESLoggerFactory;
import org.elasticsearch.common.logging.Loggers;

import java.util.ArrayList;
import java.util.List;

/**
* Logger that captures events and appends them to in memory lists, with one
* list for each log level. This works with the global log manager context,
* meaning that there could only be a single logger with the same name.
*/
public class CapturingLogger {

public static Logger newCapturingLogger(final Level level) throws IllegalAccessException {
private static final String IMPLICIT_APPENDER_NAME = "__implicit";

/**
* Constructs a new {@link CapturingLogger} named as the fully qualified name of
* the invoking method. One name can be assigned to a single logger globally, so
* don't call this method multiple times in the same method.
*
* @param level
* The minimum priority level of events that will be captured.
* @param layout
* Optional parameter allowing to set the layout format of events.
* This is useful because events are captured to be inspected (and
* parsed) later. When parsing, it is useful to be in control of the
* printing format as well. If not specified,
* {@code event.getMessage().getFormattedMessage()} is called to
* format the event.
* @return The new logger.
*/
public static Logger newCapturingLogger(final Level level, @Nullable StringLayout layout) throws IllegalAccessException {
// careful, don't "bury" this on the call stack, unless you know what you're doing
final StackTraceElement caller = Thread.currentThread().getStackTrace()[2];
final String name = caller.getClassName() + "." + caller.getMethodName() + "." + level.toString();
final Logger logger = ESLoggerFactory.getLogger(name);
Loggers.setLevel(logger, level);
final MockAppender appender = new MockAppender(name);
attachNewMockAppender(logger, IMPLICIT_APPENDER_NAME, layout);
return logger;
}
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The CapturingLogger can optionally have several appenders. By default it has only one named __implicit.


public static void attachNewMockAppender(final Logger logger, final String appenderName, @Nullable StringLayout layout)
throws IllegalAccessException {
final MockAppender appender = new MockAppender(buildAppenderName(logger.getName(), appenderName), layout);
appender.start();
Loggers.addAppender(logger, appender);
return logger;
}

private static MockAppender getMockAppender(final String name) {
private static String buildAppenderName(final String loggerName, final String appenderName) {
// appender name also has to be unique globally (logging context globally)
return loggerName + "." + appenderName;
}

private static MockAppender getMockAppender(final String loggerName, final String appenderName) {
final LoggerContext ctx = (LoggerContext) LogManager.getContext(false);
final Configuration config = ctx.getConfiguration();
final LoggerConfig loggerConfig = config.getLoggerConfig(name);
return (MockAppender) loggerConfig.getAppenders().get(name);
final LoggerConfig loggerConfig = config.getLoggerConfig(loggerName);
final String mockAppenderName = buildAppenderName(loggerName, appenderName);
return (MockAppender) loggerConfig.getAppenders().get(mockAppenderName);
}

public static boolean isEmpty(final String name) {
final MockAppender appender = getMockAppender(name);
return appender.isEmpty();
/**
* Checks if the logger's appender(s) has captured any events.
albertzaharovits marked this conversation as resolved.
Show resolved Hide resolved
*
* @param loggerName
* The unique global name of the logger.
* @param appenderNames
* Names of other appenders nested under this same logger.
* @return {@code true} if no event has been captured, {@code false} otherwise.
*/
public static boolean isEmpty(final String loggerName, final String... appenderNames) {
// check if implicit appender is empty
final MockAppender implicitAppender = getMockAppender(loggerName, IMPLICIT_APPENDER_NAME);
assert implicitAppender != null;
if (false == implicitAppender.isEmpty()) {
return false;
}
if (null == appenderNames) {
return true;
}
// check if any named appenders are empty
for (String appenderName : appenderNames) {
final MockAppender namedAppender = getMockAppender(loggerName, appenderName);
if (namedAppender != null && false == namedAppender.isEmpty()) {
return false;
}
}
return true;
}
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is empty can optionally check multiple appenders.


/**
* Gets the captured events for a logger by its name. Events are those of the
* implicit appender of the logger.
*
* @param loggerName
* The unique global name of the logger.
* @param level
* The priority level of the captured events to be returned.
* @return A list of captured events formated to {@code String}.
*/
public static List<String> output(final String loggerName, final Level level) {
return output(loggerName, IMPLICIT_APPENDER_NAME, level);
}

public static List<String> output(final String name, final Level level) {
final MockAppender appender = getMockAppender(name);
/**
* Gets the captured events for a logger and an appender by their respective
* names. There is a one to many relationship between loggers and appenders.
*
* @param loggerName
* The unique global name of the logger.
* @param appenderName
* The name of an appender associated with the {@code loggerName}
* logger.
* @param level
* The priority level of the captured events to be returned.
* @return A list of captured events formated to {@code String}.
*/
public static List<String> output(final String loggerName, final String appenderName, final Level level) {
final MockAppender appender = getMockAppender(loggerName, appenderName);
return appender.output(level);
}

Expand All @@ -58,8 +147,8 @@ private static class MockAppender extends AbstractAppender {
public final List<String> debug = new ArrayList<>();
public final List<String> trace = new ArrayList<>();

private MockAppender(final String name) throws IllegalAccessException {
super(name, RegexFilter.createFilter(".*(\n.*)*", new String[0], false, null, null), null);
private MockAppender(final String name, StringLayout layout) throws IllegalAccessException {
super(name, RegexFilter.createFilter(".*(\n.*)*", new String[0], false, null, null), layout);
}

@Override
Expand All @@ -68,25 +157,34 @@ public void append(LogEvent event) {
// we can not keep a reference to the event here because Log4j is using a thread
// local instance under the hood
case "ERROR":
error.add(event.getMessage().getFormattedMessage());
error.add(formatMessage(event));
break;
case "WARN":
warn.add(event.getMessage().getFormattedMessage());
warn.add(formatMessage(event));
break;
case "INFO":
info.add(event.getMessage().getFormattedMessage());
info.add(formatMessage(event));
break;
case "DEBUG":
debug.add(event.getMessage().getFormattedMessage());
debug.add(formatMessage(event));
break;
case "TRACE":
trace.add(event.getMessage().getFormattedMessage());
trace.add(formatMessage(event));
break;
default:
throw invalidLevelException(event.getLevel());
}
}

private String formatMessage(LogEvent event) {
final Layout<?> layout = getLayout();
if (layout instanceof StringLayout) {
return ((StringLayout) layout).toSerializable(event);
} else {
return event.getMessage().getFormattedMessage();
}
}

private IllegalArgumentException invalidLevelException(Level level) {
return new IllegalArgumentException("invalid level, expected [ERROR|WARN|INFO|DEBUG|TRACE] but was [" + level + "]");
}
Expand Down
1 change: 1 addition & 0 deletions x-pack/plugin/security/build.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -139,6 +139,7 @@ artifacts {
}
sourceSets.test.resources {
srcDir '../core/src/test/resources'
srcDir '../core/src/main/config'
albertzaharovits marked this conversation as resolved.
Show resolved Hide resolved
}
dependencyLicenses {
mapping from: /java-support|opensaml-.*/, to: 'shibboleth'
Expand Down
Loading