We are using Logstash (8.11.3) in our monitoring to receive data from different source systems (via Filebeat, Metricbeat, and Winlogbeat). On the Logstash side, we are using a persistence queue. Since, Logstash persistent queues store events on disk, which is "at rest”.
Recently, a security audit was conducted in our organization, and it was required to mask the content stored in the persistent queue files.
As per the current setup, with root privilege user can read (cat page file) information from the persistent queue files.
Is there any functionality or feature available on the Logstash that can help us mask the content which will be get stored in the persistent queue files?
If you need to protect against a privileged user reading the files then it's not something a tool like logstash can do. You need an OS designed from the ground up to protect against this. For example, some systems can specify which executables can access a file, what time of day or day of the week they can do it, and which users can run the executable. But that is all external to logstash.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.