Skip to content

Commit 7fe2bab

Browse files
authored
fixed asciidocalypse links in audit logging content (#549)
Fixed links to reference content from audit logging content
1 parent 4e752ac commit 7fe2bab

File tree

5 files changed

+6
-8
lines changed

5 files changed

+6
-8
lines changed

deploy-manage/monitor/logging-configuration/auditing-search-queries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ applies:
1111

1212
# Audit Elasticsearch search queries [auditing-search-queries]
1313

14-
There is no [audit event type](asciidocalypse://elasticsearch/docs/reference/elasticsearch/elasticsearch-audit-events) specifically dedicated to search queries. Search queries are analyzed and then processed; the processing triggers authorization actions that are audited. However, the original raw query, as submitted by the client, is not accessible downstream when authorization auditing occurs.
14+
There is no [audit event type](asciidocalypse://docs/elasticsearch/docs/reference/elasticsearch/elasticsearch-audit-events.md) specifically dedicated to search queries. Search queries are analyzed and then processed; the processing triggers authorization actions that are audited. However, the original raw query, as submitted by the client, is not accessible downstream when authorization auditing occurs.
1515

1616
Search queries are contained inside HTTP request bodies, however, and some audit events that are generated by the REST layer, on the coordinating node, can be toggled to output the request body to the audit log. Therefore, one must audit request bodies in order to audit search queries.
1717

deploy-manage/monitor/logging-configuration/configuring-audit-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ When auditing security events, a single client request might generate multiple a
2424
::::
2525

2626
For a complete description of event details and format, refer to the following resources:
27-
* [{{es}} audit events details and schema](asciidocalypse://elasticsearch/docs/reference/elasticsearch/elasticsearch-audit-events)
27+
* [{{es}} audit events details and schema](asciidocalypse://docs/elasticsearch/docs/reference/elasticsearch/elasticsearch-audit-events.md)
2828
* [{{es}} log entry output format](/deploy-manage/monitor/logging-configuration/logfile-audit-output.md#audit-log-entry-format)
2929

3030
### Kibana auditing configuration
@@ -38,7 +38,7 @@ In self-managed systems, you can optionally configure audit logs location, and f
3838
To configure {{kib}} settings, follow the same [procedure](./enabling-audit-logs.md#enable-audit-logging-procedure) as when enabling {{kib}} audit logs, but apply the relevant settings instead.
3939
::::
4040

41-
For a complete description of auditing event details, such as `category`, `type`, or `action`, refer to [{{kib}} audit events](https://www.elastic.co/guide/en/kibana/current/xpack-security-audit-logging.html#xpack-security-ecs-audit-logging).
41+
For a complete description of auditing event details, such as `category`, `type`, or `action`, refer to [{{kib}} audit events](asciidocalypse://docs/kibana/docs/reference/kibana-audit-events.md).
4242

4343
### General recommendations
4444

deploy-manage/monitor/logging-configuration/enabling-audit-logs.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,6 @@ spec:
126126
nodeSets:
127127
- name: default
128128
config:
129-
# https://www.elastic.co/guide/en/elasticsearch/reference/current/enable-audit-logging.html
130129
xpack.security.audit.enabled: true
131130
---
132131
apiVersion: kibana.k8s.elastic.co/v1
@@ -142,7 +141,6 @@ spec:
142141
- name: monitoring
143142
namespace: observability
144143
config:
145-
# https://www.elastic.co/guide/en/kibana/current/xpack-security-audit-logging.html
146144
xpack.security.audit.enabled: true
147145
```
148146

deploy-manage/monitor/logging-configuration/logfile-audit-output.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,4 +32,4 @@ There are however a few attributes that are exceptions to the above format. The
3232

3333
When the `request.body` attribute is present (see [Auditing search queries](auditing-search-queries.md)), it contains a string value containing the full HTTP request body, escaped as per the JSON RFC 4677.
3434

35-
Refer to [audit event types](asciidocalypse://elasticsearch/docs/reference/elasticsearch/elasticsearch-audit-events) for a complete list of fields, as well as examples, for each entry type.
35+
Refer to [audit event types](asciidocalypse://docs/elasticsearch/docs/reference/elasticsearch/elasticsearch-audit-events.md) for a complete list of fields, as well as examples, for each entry type.

deploy-manage/monitor/logging-configuration/security-event-audit-logging.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,5 +32,5 @@ By following these guidelines, you can effectively audit system activity, enhanc
3232

3333
For a complete description of audit event details and format, refer to:
3434

35-
* [Elasticsearch audit events](asciidocalypse://elasticsearch/docs/reference/elasticsearch/elasticsearch-audit-events)
36-
* [Kibana audit events](asciidocalypse://kibana/docs/reference/kibana-audit-events)
35+
* [Elasticsearch audit events](asciidocalypse://docs/elasticsearch/docs/reference/elasticsearch/elasticsearch-audit-events.md)
36+
* [Kibana audit events](asciidocalypse://docs/kibana/docs/reference/kibana-audit-events.md)

0 commit comments

Comments
 (0)