Audit Logging
Audit Logging is a new feature in Apache Cassandra 4.0 (CASSANDRA-12151). All database activity is logged to a directory in the local filesystem and the audit log files are rolled periodically. All database operations are monitored and recorded. Audit logs are stored in local directory files instead of the database itself as it provides several benefits, some of which are:
-
No additional database capacity is needed to store audit logs
-
No query tool is required while storing the audit logs in the database would require a query tool
-
Latency of database operations is not affected; no performance impact
-
It is easier to implement file based logging than database based logging
What does Audit Logging Log?
Audit logging logs:
-
All authentication which includes successful and failed login attempts
-
All database command requests to CQL. Both failed and successful CQL is logged
More specifically an audit log entry could be one of two types:
-
CQL Audit Log Entry Type or
-
Common Audit Log Entry Type
Each of these types comprises of several database operations. The CQL Audit Log Entry Type could be one of the following; the category of the CQL audit log entry type is listed in parentheses.
-
SELECT(QUERY),
-
UPDATE(DML),
-
DELETE(DML),
-
TRUNCATE(DDL),
-
CREATE_KEYSPACE(DDL),
-
ALTER_KEYSPACE(DDL),
-
DROP_KEYSPACE(DDL),
-
CREATE_TABLE(DDL),
-
DROP_TABLE(DDL),
-
PREPARE_STATEMENT(PREPARE),
-
DROP_TRIGGER(DDL),
-
LIST_USERS(DCL),
-
CREATE_INDEX(DDL),
-
DROP_INDEX(DDL),
-
GRANT(DCL),
-
REVOKE(DCL),
-
CREATE_TYPE(DDL),
-
DROP_AGGREGATE(DDL),
-
ALTER_VIEW(DDL),
-
CREATE_VIEW(DDL),
-
DROP_ROLE(DCL),
-
CREATE_FUNCTION(DDL),
-
ALTER_TABLE(DDL),
-
BATCH(DML),
-
CREATE_AGGREGATE(DDL),
-
DROP_VIEW(DDL),
-
DROP_TYPE(DDL),
-
DROP_FUNCTION(DDL),
-
ALTER_ROLE(DCL),
-
CREATE_TRIGGER(DDL),
-
LIST_ROLES(DCL),
-
LIST_PERMISSIONS(DCL),
-
ALTER_TYPE(DDL),
-
CREATE_ROLE(DCL),
-
USE_KEYSPACE (OTHER).
The Common Audit Log Entry Type could be one of the following; the category of the Common audit log entry type is listed in parentheses.
-
REQUEST_FAILURE(ERROR),
-
LOGIN_ERROR(AUTH),
-
UNAUTHORIZED_ATTEMPT(AUTH),
-
LOGIN_SUCCESS (AUTH).
What Audit Logging does not Log?
Audit logging does not log:
-
Configuration changes made in
cassandra.yaml
-
Nodetool Commands
Audit Logging is Flexible and Configurable
Audit logging is flexible and configurable in cassandra.yaml
as
follows:
-
Keyspaces and tables to be monitored and audited may be specified.
-
Users to be included/excluded may be specified. By default all users are audit logged.
-
Categories of operations to audit or exclude may be specified.
-
The frequency at which to roll the log files may be specified. Default frequency is hourly.
Configuring Audit Logging
Audit Logging is configured on each node separately. Audit Logging is
configured in cassandra.yaml
in the audit_logging_options
setting.
The settings may be same/different on each node.
Enabling Audit Logging
Audit logging is enabled by setting the enabled
option to true
in
the audit_logging_options
setting.
audit_logging_options: enabled: true
Setting the Logger
The audit logger is set with the logger
option.
logger: BinAuditLogger
Two types of audit loggers are supported: FileAuditLogger
and
BinAuditLogger
. BinAuditLogger
is the default setting. The
BinAuditLogger
is an efficient way to log events to file in a binary
format.
FileAuditLogger
is synchronous, file-based audit logger; just uses the
standard logging mechanism. FileAuditLogger
logs events to
audit/audit.log
file using slf4j
logger.
The NoOpAuditLogger
is a No-Op implementation of the audit logger to
be used as a default audit logger when audit logging is disabled.
Setting the Audit Logs Directory
The audit logs directory is set with the audit_logs_dir
option. A new
directory is not created automatically and an existing directory must be
set. Audit Logs directory can be configured using
cassandra.logdir.audit
system property or default is set to
cassandra.logdir + /audit/
. A user created directory may be set. As an
example, create a directory for the audit logs and set its permissions.
sudo mkdir –p /cassandra/audit/logs/hourly sudo chmod -R 777 /cassandra/audit/logs/hourly
Set the directory for the audit logs directory using the
audit_logs_dir
option.
audit_logs_dir: "/cassandra/audit/logs/hourly"
Setting Keyspaces to Audit
Set the keyspaces to include with the included_keyspaces
option and
the keyspaces to exclude with the excluded_keyspaces
option. By
default all keyspaces are included. By default, system
,
system_schema
and system_virtual_schema
are excluded.
# included_keyspaces: # excluded_keyspaces: system, system_schema, system_virtual_schema
Setting Categories to Audit
The categories of database operations to be included are specified with
the included_categories
option as a comma separated list. By default
all supported categories are included. The categories of database
operations to be excluded are specified with excluded_categories
option as a comma separated list. By default no category is excluded.
# included_categories: # excluded_categories:
The supported categories for audit log are:
-
QUERY
-
DML
-
DDL
-
DCL
-
OTHER
-
AUTH
-
ERROR
-
PREPARE
Setting Users to Audit
Users to audit log are set with the included_users
and
excluded_users
options. The included_users
option specifies a comma
separated list of users to include explicitly and by default all users
are included. The excluded_users
option specifies a comma separated
list of users to exclude explicitly and by default no user is excluded.
# included_users: # excluded_users:
Setting the Roll Frequency
The roll_cycle
option sets the frequency at which the audit log file
is rolled. Supported values are MINUTELY
, HOURLY
, and DAILY
.
Default value is HOURLY
, which implies that after every hour a new
audit log file is created.
roll_cycle: HOURLY
An audit log file could get rolled for other reasons as well such as a log file reaches the configured size threshold.
Setting Archiving Options
The archiving options are for archiving the rolled audit logs. The
archive
command to use is set with the archive_command
option and
the max_archive_retries
sets the maximum # of tries of failed archive
commands.
# archive_command: # max_archive_retries: 10
Default archive command is "/path/to/script.sh %path"
where %path
is
replaced with the file being rolled:
Other Settings
The other audit logs settings are as follows.
# block: true # max_queue_weight: 268435456 # 256 MiB # max_log_size: 17179869184 # 16 GiB
The block
option specifies whether the audit logging should block if
the logging falls behind or should drop log records.
The max_queue_weight
option sets the maximum weight of in memory queue
for records waiting to be written to the file before blocking or
dropping.
The max_log_size
option sets the maximum size of the rolled files to
retain on disk before deleting the oldest.
Using Nodetool to Enable Audit Logging
The nodetool enableauditlog
command may be used to enable audit logs
and it overrides the settings in cassandra.yaml
. The
nodetool enableauditlog
command syntax is as follows.
nodetool [(-h <host> | --host <host>)] [(-p <port> | --port <port>)] [(-pp | --print-port)] [(-pw <password> | --password <password>)] [(-pwf <passwordFilePath> | --password-file <passwordFilePath>)] [(-u <username> | --username <username>)] enableauditlog [--excluded-categories <excluded_categories>] [--excluded-keyspaces <excluded_keyspaces>] [--excluded-users <excluded_users>] [--included-categories <included_categories>] [--included-keyspaces <included_keyspaces>] [--included-users <included_users>] [--logger <logger>]
- OPTIONS
-
- --excluded-categories <excluded_categories>
-
Comma separated list of Audit Log Categories to be excluded for audit log. If not set the value from cassandra.yaml will be used
- --excluded-keyspaces <excluded_keyspaces>
-
Comma separated list of keyspaces to be excluded for audit log. If not set the value from cassandra.yaml will be used
- --excluded-users <excluded_users>
-
Comma separated list of users to be excluded for audit log. If not set the value from cassandra.yaml will be used
- -h <host>, --host <host>
-
Node hostname or ip address
- --included-categories <included_categories>
-
Comma separated list of Audit Log Categories to be included for audit log. If not set the value from cassandra.yaml will be used
- --included-keyspaces <included_keyspaces>
-
Comma separated list of keyspaces to be included for audit log. If not set the value from cassandra.yaml will be used
- --included-users <included_users>
-
Comma separated list of users to be included for audit log. If not set the value from cassandra.yaml will be used
- --logger <logger>
-
Logger name to be used for AuditLogging. Default BinAuditLogger. If not set the value from cassandra.yaml will be used
- -p <port>, --port <port>
-
Remote jmx agent port number
- -pp, --print-port
-
Operate in 4.0 mode with hosts disambiguated by port number
- -pw <password>, --password <password>
-
Remote jmx agent password
- -pwf <passwordFilePath>, --password-file <passwordFilePath>
-
Path to the JMX password file
- -u <username>, --username <username>
-
Remote jmx agent username
The nodetool disableauditlog
command disables audit log. The command
syntax is as follows.
nodetool [(-h <host> | --host <host>)] [(-p <port> | --port <port>)] [(-pp | --print-port)] [(-pw <password> | --password <password>)] [(-pwf <passwordFilePath> | --password-file <passwordFilePath>)] [(-u <username> | --username <username>)] disableauditlog
- OPTIONS
-
- -h <host>, --host <host>
-
Node hostname or ip address
- -p <port>, --port <port>
-
Remote jmx agent port number
- -pp, --print-port
-
Operate in 4.0 mode with hosts disambiguated by port number
- -pw <password>, --password <password>
-
Remote jmx agent password
- -pwf <passwordFilePath>, --password-file <passwordFilePath>
-
Path to the JMX password file
- -u <username>, --username <username>
-
Remote jmx agent username
Viewing the Audit Logs
An audit log event comprises of a keyspace that is being audited, the operation that is being logged, the scope and the user. An audit log entry comprises of the following attributes concatenated with a "|".
type (AuditLogEntryType): Type of request source (InetAddressAndPort): Source IP Address from which request originated user (String): User name timestamp (long ): Timestamp of the request batch (UUID): Batch of request keyspace (String): Keyspace on which request is made scope (String): Scope of request such as Table/Function/Aggregate name operation (String): Database operation such as CQL command options (QueryOptions): CQL Query options state (QueryState): State related to a given query
Some of these attributes may not be applicable to a given request and not all of these options must be set.
An Audit Logging Demo
To demonstrate audit logging enable and configure audit logs with following settings.
audit_logging_options: enabled: true logger: BinAuditLogger audit_logs_dir: "/cassandra/audit/logs/hourly" # included_keyspaces: # excluded_keyspaces: system, system_schema, system_virtual_schema # included_categories: # excluded_categories: # included_users: # excluded_users: roll_cycle: HOURLY # block: true # max_queue_weight: 268435456 # 256 MiB # max_log_size: 17179869184 # 16 GiB ## archive command is "/path/to/script.sh %path" where %path is replaced with the file being rolled: # archive_command: # max_archive_retries: 10
Create the audit log directory /cassandra/audit/logs/hourly
and set
its permissions as discussed earlier. Run some CQL commands such as
create a keyspace, create a table and query a table. Any supported CQL
commands may be run as discussed in section What does Audit Logging
Log?. Change directory (with cd
command) to the audit logs directory.
cd /cassandra/audit/logs/hourly
List the files/directories and some .cq4
files should get listed.
These are the audit logs files.
[ec2-user@ip-10-0-2-238 hourly]$ ls -l total 28 -rw-rw-r--. 1 ec2-user ec2-user 83886080 Aug 2 03:01 20190802-02.cq4 -rw-rw-r--. 1 ec2-user ec2-user 83886080 Aug 2 03:01 20190802-03.cq4 -rw-rw-r--. 1 ec2-user ec2-user 65536 Aug 2 03:01 directory-listing.cq4t
The auditlogviewer
tool is used to dump audit logs. Run the
auditlogviewer
tool. Audit log files directory path is a required
argument. The output should be similar to the following output.
[ec2-user@ip-10-0-2-238 hourly]$ auditlogviewer /cassandra/audit/logs/hourly WARN 03:12:11,124 Using Pauser.sleepy() as not enough processors, have 2, needs 8+ Type: AuditLog LogMessage: user:anonymous|host:10.0.2.238:7000|source:/127.0.0.1|port:46264|timestamp:1564711427328|type :USE_KEYSPACE|category:OTHER|ks:auditlogkeyspace|operation:USE AuditLogKeyspace; Type: AuditLog LogMessage: user:anonymous|host:10.0.2.238:7000|source:/127.0.0.1|port:46264|timestamp:1564711427329|type :USE_KEYSPACE|category:OTHER|ks:auditlogkeyspace|operation:USE "auditlogkeyspace" Type: AuditLog LogMessage: user:anonymous|host:10.0.2.238:7000|source:/127.0.0.1|port:46264|timestamp:1564711446279|type :SELECT|category:QUERY|ks:auditlogkeyspace|scope:t|operation:SELECT * FROM t; Type: AuditLog LogMessage: user:anonymous|host:10.0.2.238:7000|source:/127.0.0.1|port:46264|timestamp:1564713878834|type :DROP_TABLE|category:DDL|ks:auditlogkeyspace|scope:t|operation:DROP TABLE IF EXISTS AuditLogKeyspace.t; Type: AuditLog LogMessage: user:anonymous|host:10.0.2.238:7000|source:/3.91.56.164|port:42382|timestamp:1564714618360|ty pe:REQUEST_FAILURE|category:ERROR|operation:CREATE KEYSPACE AuditLogKeyspace WITH replication = {'class': 'SimpleStrategy', 'replication_factor' : 1};; Cannot add existing keyspace "auditlogkeyspace" Type: AuditLog LogMessage: user:anonymous|host:10.0.2.238:7000|source:/127.0.0.1|port:46264|timestamp:1564714690968|type :DROP_KEYSPACE|category:DDL|ks:auditlogkeyspace|operation:DROP KEYSPACE AuditLogKeyspace; Type: AuditLog LogMessage: user:anonymous|host:10.0.2.238:7000|source:/3.91.56.164|port:42406|timestamp:1564714708329|ty pe:CREATE_KEYSPACE|category:DDL|ks:auditlogkeyspace|operation:CREATE KEYSPACE AuditLogKeyspace WITH replication = {'class': 'SimpleStrategy', 'replication_factor' : 1}; Type: AuditLog LogMessage: user:anonymous|host:10.0.2.238:7000|source:/127.0.0.1|port:46264|timestamp:1564714870678|type :USE_KEYSPACE|category:OTHER|ks:auditlogkeyspace|operation:USE auditlogkeyspace; [ec2-user@ip-10-0-2-238 hourly]$
The auditlogviewer
tool usage syntax is as follows.
./auditlogviewer Audit log files directory path is a required argument. usage: auditlogviewer <path1> [<path2>...<pathN>] [options] -- View the audit log contents in human readable format -- Options are: -f,--follow Upon reaching the end of the log continue indefinitely waiting for more records -h,--help display this help message -r,--roll_cycle How often to roll the log file was rolled. May be necessary for Chronicle to correctly parse file names. (MINUTELY, HOURLY, DAILY). Default HOURLY.