Skip to content

Commit 0300018

Browse files
nphilbrookschavis
andauthored
Vault Audit Logs: correct anchor link and replication note (#1466)
* Correct anchor link for exempted audit log endpoints * Note on replication * Apply suggestion from @schavis Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
1 parent c9c5ec8 commit 0300018

File tree

2 files changed

+6
-2
lines changed

2 files changed

+6
-2
lines changed

content/vault/v1.20.x/content/docs/audit/index.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Audit devices are mountable devices that log requests and responses
66

77
# Audit logging
88

9-
With a small set of [exceptions](#excepted-api-endpoints), Vault audit devices record all API requests and responses in detail. An audit device can be a [file](/vault/docs/audit/file), a [syslog server](/vault/docs/audit/syslog), or a [socket](/vault/docs/audit/socket).
9+
With a small set of [exceptions](#exempted-api-endpoints), Vault audit devices record all API requests and responses in detail. An audit device can be a [file](/vault/docs/audit/file), a [syslog server](/vault/docs/audit/syslog), or a [socket](/vault/docs/audit/socket).
1010

1111
Refer to the [best practices](/vault/docs/audit/best-practices) page for important considerations before you configure your audit devices.
1212

@@ -29,6 +29,8 @@ $ vault audit enable file \
2929

3030
Vault replicates audit device configurations to all nodes within a cluster. Vault Enterprise also replicates audit device configurations to performance secondary and disaster recovery secondary clusters unless you configure the audit device as [`local`](/vault/api-docs/system/audit#local) to the cluster. Before you enable an audit device, ensure that all Vault nodes to which the audit device configuration replicates can successfully log to that audit device.
3131

32+
Disaster recovery secondary clusters do not log to any audit devices until Vault promotes the cluster to primary.
33+
3234
When you disable an audit device, Vault immediately stops writing information to the device, but leaves the existing log information untouched.
3335

3436
Once you disable an audit device, you can no longer [compute hashes](#hashing-sensitive-values) for the associated audit log entries. Even if you re-enable the audit device at the same path, Vault creates a new hashing key for the new log entries.

content/vault/v1.21.x/content/docs/audit/index.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Audit devices are mountable devices that log requests and responses
66

77
# Audit logging
88

9-
With a small set of [exceptions](#excepted-api-endpoints), Vault audit devices record all API requests and responses in detail. An audit device can be a [file](/vault/docs/audit/file), a [syslog server](/vault/docs/audit/syslog), or a [socket](/vault/docs/audit/socket).
9+
With a small set of [exceptions](#exempted-api-endpoints), Vault audit devices record all API requests and responses in detail. An audit device can be a [file](/vault/docs/audit/file), a [syslog server](/vault/docs/audit/syslog), or a [socket](/vault/docs/audit/socket).
1010

1111
Refer to the [best practices](/vault/docs/audit/best-practices) page for important considerations before you configure your audit devices.
1212

@@ -29,6 +29,8 @@ $ vault audit enable file \
2929

3030
Vault replicates audit device configurations to all nodes within a cluster. Vault Enterprise also replicates audit device configurations to performance secondary and disaster recovery secondary clusters unless you configure the audit device as [`local`](/vault/api-docs/system/audit#local) to the cluster. Before you enable an audit device, ensure that all Vault nodes to which the audit device configuration replicates can successfully log to that audit device.
3131

32+
Disaster recovery secondary clusters do not log to any audit devices until Vault promotes the cluster to primary.
33+
3234
When you disable an audit device, Vault immediately stops writing information to the device, but leaves the existing log information untouched.
3335

3436
Once you disable an audit device, you can no longer [compute hashes](#hashing-sensitive-values) for the associated audit log entries. Even if you re-enable the audit device at the same path, Vault creates a new hashing key for the new log entries.

0 commit comments

Comments
 (0)