Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Audit: eventlogger sink node reopen on SIGHUP #23598

Merged
merged 5 commits into from
Oct 11, 2023

Conversation

peteski22
Copy link

@peteski22 peteski22 commented Oct 11, 2023

When Vault receives SIGHUP it iterates a maintained set of reload functions which have responsibility to perform the relevant re-parsing/reconfiguration/reopening of files/Vault/etc.

This PR ensures that if an eventlogger sink node (file, syslog, socket) exists within a given audit backend, then it is asked to reopen, rather than interacting with the older (deprecated) way of handling files.

Issue reference: #23596

Note: this PR is currently in draft pending further investigations, but it looks likely this is a bug.

@peteski22 peteski22 added core/audit hashicorp-contributed-pr If the PR is HashiCorp (i.e. not-community) contributed labels Oct 11, 2023
@peteski22 peteski22 added this to the 1.15.1 milestone Oct 11, 2023
@peteski22 peteski22 requested review from marcboudreau and a team October 11, 2023 12:43
@peteski22 peteski22 added the bug Used to indicate a potential bug label Oct 11, 2023
@github-actions
Copy link

CI Results:
All Go tests succeeded! ✅

@peteski22 peteski22 marked this pull request as ready for review October 11, 2023 13:50
Copy link
Contributor

@ccapurso ccapurso left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good!

@github-actions
Copy link

Build Results:
All builds succeeded! ✅

@raskchanky
Copy link
Contributor

marcboudreau pushed a commit that referenced this pull request Oct 11, 2023
…guration (#23547)

* CI: Pre-emptively delete logs dir after cache restore in test-collect-reports (#23600)

* Fix OktaNumberChallenge (#23565)

* remove arg

* changelog

* exclude changelog in verifying doc/ui PRs (#23601)

* Audit: eventlogger sink node reopen on SIGHUP (#23598)

* ensure nodes are asked to reload audit files on SIGHUP

* added changelog

* Capture errors emitted from all nodes during proccessing of audit pipelines (#23582)

* Update security-scan.yml

* Listeners: Redaction only for TCP (#23592)

* redaction should only work for TCP listeners, also fix bug that allowed custom response headers for unix listeners

* fix failing test

* updates from PR feedback

* fix panic when unlocking unlocked user (#23611)

* VAULT-18307: update rotation period for aws static roles on update (#23528)

* add disable_replication_status_endpoints tcp listener config parameter

* add wrapping handler for disabled replication status endpoints setting

* adapt disable_replication_status_endpoints configuration parsing code to refactored parsing code

* refactor configuration parsing code to facilitate testing

* fix a panic when parsing configuration

* update refactored configuration parsing code

* fix merge corruption

* add changelog file

* document new TCP listener configuration parameter

* make sure disable_replication_status_endpoints only has effect on TCP listeners

* use active voice for explanation of disable_replication_status_endpoints

* fix minor merge issue

---------

Co-authored-by: Kuba Wieczorek <[email protected]>
Co-authored-by: Angel Garbarino <[email protected]>
Co-authored-by: Hamid Ghaf <[email protected]>
Co-authored-by: Peter Wilson <[email protected]>
Co-authored-by: Mark Collao <[email protected]>
Co-authored-by: davidadeleon <[email protected]>
Co-authored-by: kpcraig <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Used to indicate a potential bug core/audit hashicorp-contributed-pr If the PR is HashiCorp (i.e. not-community) contributed
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants