blob: bf412722b1274a2d99d75c172e5dd44bbaaad8bd [file] [log] [blame]
---
layout: api
page_title: /sys/config/auditing - HTTP API
description: The `/sys/config/auditing` endpoint is used to configure auditing settings.
---
# `/sys/config/auditing`
@include 'alerts/restricted-root.mdx'
The `/sys/config/auditing` endpoint is used to configure auditing settings.
## Read all audited request headers
This endpoint lists the request headers that are configured to be audited.
- **`sudo` required** – This endpoint requires `sudo` capability in addition to
any path-specific capabilities.
| Method | Path |
| :----- | :------------------------------------- |
| `GET` | `/sys/config/auditing/request-headers` |
### Sample request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers
```
### Sample response
```json
{
"headers": {
"X-Forwarded-For": {
"hmac": true
}
}
}
```
## Read single audit request header
This endpoint lists the information for the given request header.
- **`sudo` required** – This endpoint requires `sudo` capability in addition to
any path-specific capabilities.
| Method | Path |
| :----- | :------------------------------------------- |
| `GET` | `/sys/config/auditing/request-headers/:name` |
### Parameters
- `name` `(string: <required>)` Specifies the name of the request header to
query. This is specified as part of the URL.
### Sample request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
```
### Sample response
```json
{
"X-Forwarded-For": {
"hmac": true
}
}
```
## Create/Update audit request header
This endpoint enables auditing of a header.
- **`sudo` required** – This endpoint requires `sudo` capability in addition to
any path-specific capabilities.
| Method | Path |
| :----- | :------------------------------------------- |
| `POST` | `/sys/config/auditing/request-headers/:name` |
### Parameters
- `hmac` `(bool: false)` – Specifies if this header's value should be HMAC'ed in
the audit logs.
### Sample payload
```json
{
"hmac": true
}
```
### Sample request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
```
## Delete audit request header
This endpoint disables auditing of the given request header.
- **`sudo` required** – This endpoint requires `sudo` capability in addition to
any path-specific capabilities.
| Method | Path |
| :------- | :------------------------------------------- |
| `DELETE` | `/sys/config/auditing/request-headers/:name` |
### Sample request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
http://127.0.0.1:8200/v1/sys/config/auditing/request-headers/my-header
```