Open aekrohn opened 3 years ago
@aekrohn do you agree that the proper order to do this would actually be enable an additional audit to stdout
before disabling the syslog audit and then proceeding with the migration. This way there would be no loss at source nor any downtime on the K8S destination since stdout is common output strategy there:
vault audit enable -path=file_stdout file file_path=stdout ;
# // vault audit list && vault audit disable ...
There's also the recovery approach as a worse case scenario if you have no means of going back where you could disable things like they've shown on this Support KB article:
Recovery using recovery-mode - Deleting Audit Devices
At the very least, there should be a giant warning somewhere in the docs describing this scenario.
@aekrohn hey any ideas where in the docs you'd put this call out?
The last portion of ask I feel may be reasonable to provide a -audit-ignore-on-boot
parameter or configuration setting for the purpose of booting especially in cases where audit devices / paths are broken beyond repair.
Ignore broken audit config settings in source data, even if that means auditing is no longer functional on target deployment. Emit a warning to notify user this has happened.
Describe the bug After performing a migration of prod data and unsealing Vault, pods in HA configuration are unable to elect a leader.
(NOTE: a workaround for this problem is at the end of this post)
syslog
for Auditingsyslog
package installedsyslog
package installedThe following log files indicate the specific issue, but it was difficult to determine what the core problem was:
To Reproduce Steps to reproduce the behavior:
syslog
for auditingExpected behavior
Environment:
vault status
): Source: 1.1.1, Dest: 1.5.2vault version
): 1.5.5Vault Helm chart values:
Workaround This problem can be solved by disabling syslog auditing on the source Vault deployment, running the migration, and then enabling syslog auditing again after migration is completed. This is fine for some environments, but probably not all, and would almost certainly raise some questions during a formal audit.