Closed eric-belhomme closed 1 year ago
ScyllaDB Alternator won't work. We've tried going that route and failed, as it doesn't support DescribeTimeToLive which is required by Teleport. You might want to give the SQL backend, which was introduced in 9.1.0, a shot.
Unfortunately the SQL backend doesn't solve this problem either, as it only keeps the backend storage (users, roles, auth connectors) etc there. There is still no HA on-premise storage option available with Teleport.
The best solution currently is to have Filebeat or another collector read the JSON-formatted Teleport audit logs from each machine's disk and send them to a SIEM or other aggregator.
You are right, the only way to have a consistent log in the UI is to use managed backend for audit events, DynamoDB, Firebase.
We are working on a new version of a backend that may be using S3 for everything, we will keep you posted.
For now, we recommend you send all the audit events via our event forwarder to SIEM of your choice to get a centralized view there.
Do you have any news on the subject? It really seems like the S3 approach is the way to go, pretty much like Grafana Loki does or similar tools, to use S3 as its only backend. Also this seems the only way to go for having H-A mode on premise installations as well, since deploying a SIEM for this might be kind of a cannonball-fly situation for small deployments in which the SIEM software itself will be several orders of magnitudes more complex and larger than the original teleport setup, not forgetting that the session recordings playback feature is not provided by a SIEM software as well....
We're working on a Postgres-based HA backend for Teleport which will also cover HA audit logs and allow a comprehensive view of all session recordings/audit events. It should be released with Teleport 13.3.0 at the end of July/beginning of August.
Very much appreciated and thanks for the heads-up! Looking forward!
Postgres backend was released in 13.3
Description
I setup an high-availibility Teleport cluster on-premise, private infra composed of:
All nodes are running Linux Alma Linux 8.5 and Teleport v9.0.4 git:v9.0.4-0-gf577413 go1.17.7
This setup first looked to work as expected until I noticed inconsistencies on "audit logs" and "session recording" ! After troubleshooting I understood on don't get the same views depending on which proxy server I get balanced on by haproxy :
So I wonder the guilty is
/var/lib/teleport/log/events.log
: looking deeper showed me that each line on this file is a JSON blob, and of course each proxy have its own, local log file, this explains that...That said, you might say it's not a bug, but a misconfiguration, and you're right... But at this time, the only available on Teleport for distributed event logs is DynamoDB, which is only available for Teleport running in AWS cloud ! I might try a 1:1 replacement with ScyllaDB Alternator for example, but this kind of hack seems to me unnecessarily complicated as we already have a key/value server available with etcd !
What happened:
splitted event log and sessions records depending on which proxy is responding
What you expected to happen:
Unified event log and sessions records whichever proxy is responding
Reproduction Steps
As minimally and precisely as possible, describe step-by-step how to reproduce the problem.
Server Details
Client Details
tsh version
): unrelevant but v9.0.4 git:v9.0.4-0-gf577413d3 go1.17.7Debug Logs
unrelevant