About the Device

HashiCorp Vault is an identity-based secrets and encryption management system. A secret is anything that you want to tightly control access to, such as API encryption keys, passwords, and certificates.
Vault provides encryption services that are gated by authentication and authorization methods.
Vault works primarily with tokens and a token is associated to the client's policy.

Device Information

 Entity

Particulars

Vendor Name

HashiCorp

Product Name

Vault

Type of Device

Hosted

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol

Log collection method

Hashicorp Vault

HASHICORP

SYSLOG+JSON

CyberHub

Port Requirements

Source

Destination

Port

Vault

CyberHub

10014 (Secure TCP)

Device Configuration

  1. Log in to the HashiCorp Vault CLI

$ vault login
  1. Enable audit logging and assign permission

$ vault audit enable file file_path=/var/log/vault_audit.log mode=644
  1. Configure log rotation via log rotate under path /etc/logrotate.d

  2. Create a file named vault_audit.log with this content:

/var/log/vault/vault_audit.log {
rotate 10
daily
#Do not execute rotate if the log file is empty.
notifempty
missingok
compress
#Set compress on next rotate cycle to prevent entry loss when performing compression.
delaycompress
copytruncate
extension log
dateext
dateformat %Y-%m-%d.
}

To configure NxLog Agent for TLS TCP Log flow on port 10014:

$ systemctl start nxlog

Integration Parameters

Parameters required from customer for Integration.

Property

Default Value

Description

IP Address

Vault interface IP address

Hostname or IP address of the device which forwards logs to the CyberHub