原英文版地址: https://www.elastic.co/guide/en/elasticsearch/reference/7.7/auditing-search-queries.html, 原文档版权归 www.elastic.co 所有
本地英文版地址: ../en/auditing-search-queries.html

Auditing search queriesedit

There is no audit event type specifically dedicated to search queries. Search queries are analyzed and then processed; the processing triggers authorization actions that are audited. However, the original raw query, as submitted by the client, is not accessible downstream when authorization auditing occurs.

Search queries are contained inside HTTP request bodies, however, and some audit events that are generated by the REST layer can be toggled to output the request body to the audit log.

To make certain audit events include the request body, edit the following setting in the elasticsearch.yml file:

xpack.security.audit.logfile.events.emit_request_body: true

No filtering is performed when auditing, so sensitive data might be audited in plain text when audit events include the request body. Also, the request body can contain malicious content that can break a parser consuming the audit logs.

There are only a handful of audit event types that are generated in the REST layer and can access the request body. Most of them are not included by default.

A good practical piece of advice is to add authentication_success to the event types that are audited (add it to the list in the xpack.security.audit.logfile.events.include), as this event type is not audited by default.

Typically, the include list contains other event types as well, such as access_granted or access_denied.