Expand description
Command implementations for analyzing Vault audit logs.
Each module in this package implements a specific analysis command, providing specialized insights into different aspects of Vault usage.
§Command Categories
§Entity Analysis Commands
Track and analyze Vault identity entities across time:
entity_analysis- Unified entity lifecycle analysis, creation tracking, and preprocessingentity-analysis churn- Compare entity activity across multiple days to detect churnentity-analysis creation- Identify when entities first appear in logsentity-analysis gaps- Find gaps in entity activity patternsentity-analysis timeline- Visualize entity activity over timeentity-analysis preprocess- Extract entity data for external processing
entity_list- List all entities found in audit logsentity_creation- ⚠️ DEPRECATED: Useentity-analysis creationinsteadentity_churn- ⚠️ DEPRECATED: Useentity-analysis churninsteadentity_gaps- ⚠️ DEPRECATED: Useentity-analysis gapsinsteadentity_timeline- ⚠️ DEPRECATED: Useentity-analysis timelineinsteadpreprocess_entities- ⚠️ DEPRECATED: Useentity-analysis preprocessinstead
§Token Analysis Commands
Analyze token lifecycle and usage patterns:
token_analysis- Unified token operations, abuse detection, and exporttoken_operations- ⚠️ DEPRECATED: Usetoken-analysisinsteadtoken_lookup_abuse- ⚠️ DEPRECATED: Usetoken-analysis --abuse-thresholdinsteadtoken_export- ⚠️ DEPRECATED: Usetoken-analysis --exportinstead
§KV Secrets Analysis Commands
Understand KV secrets engine usage:
kv_analysis- Unified KV secrets analysis - usage, comparison, and summarizationkv-analysis analyze- Analyze KV secret access patterns and frequencykv-analysis compare- Compare KV usage across different time periodskv-analysis summary- Summarize KV usage by mount point
kv_analyzer- ⚠️ DEPRECATED: Usekv-analysis analyzeinsteadkv_summary- ⚠️ DEPRECATED: Usekv-analysis summaryinsteadkv_compare- ⚠️ DEPRECATED: Usekv-analysis compareinstead
§Authentication Analysis Commands
Analyze authentication patterns:
k8s_auth- Analyze Kubernetes authentication patterns and service accounts
§System Analysis Commands
High-level system insights:
system_overview- Generate high-level statistics about audit logspath_hotspots- Identify most frequently accessed pathsclient_activity- Analyze client access patternsairflow_polling- Detect Airflow polling behavior patterns
Modules§
- airflow_
polling - Airflow polling pattern detection.
- client_
activity - Client activity metrics from Vault API.
- entity_
analysis - Unified entity analysis command.
- entity_
churn - Multi-day entity churn analysis with intelligent ephemeral pattern detection.
- entity_
creation - Entity creation analysis command.
- entity_
gaps - Entity gaps analysis command.
- entity_
list - Entity list export command.
- entity_
timeline - Entity timeline visualization command.
- k8s_
auth - Kubernetes authentication analysis command.
- kv_
analysis - Unified KV secrets analysis command.
- kv_
analyzer - KV secrets engine usage analyzer.
- kv_
compare - KV usage comparison across time periods.
- kv_
summary - KV usage summary from CSV exports.
- path_
hotspots - Path hotspot analysis command.
- preprocess_
entities - Entity mapping preprocessor.
- system_
overview - System-wide audit log overview.
- token_
analysis - Unified token analysis command.
- token_
export - Token lookup pattern exporter.
- token_
lookup_ abuse - Token lookup abuse detection.
- token_
operations - Token lifecycle operations analysis.