Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enhanced command search availability options in the WebUI within session recordings. #52721

Open
pnrao1983 opened this issue Mar 3, 2025 · 1 comment
Labels
c-extn Internal Customer Reference feature-request Used for new features in Teleport, improvements to current should be #enhancements

Comments

@pnrao1983
Copy link
Contributor

What would you like Teleport to do?
Allow users to search session recordings based on specific commands or operations executed during the session in the Web UI.

What problem does this solve?
Currently, session recordings cannot be located based on the commands executed(For ex: if I want check who executed kubectl delete pod or any thing like this). This makes it difficult to audit user actions, investigate security incidents, or track specific operational tasks. Implementing this feature would improve searchability, compliance, and incident response.

If a workaround exists, please include it.
At present, session recordings can only be reviewed manually or by correlating them with logs. While audit logs contain command executions, they do not link directly to the session recordings, making the process time-consuming and inefficient. We have the below feature request pending implementation for kube exec session audit events. Still, the customers want to have the command search option in the WebUI within the session recordings.
The other option to view offline below can be leveraged to search and view the commands executed in the terminal:

tsh recordings ls
ID                                   Type Participants Target                                  Timestamp
------------------------------------ ---- ------------ --------------------------------------- -----------------------
b2ed54eb-12a2-4c6e-96e8-d36004f2fd55 ssh  admin        ip-10-0-9-35.us-west-1.compute.internal Mar 3 2025 19:47:17 UTC
pnrao@pnrao ~ % tsh play b2ed54eb-12a2-4c6e-96e8-d36004f2fd55 --format json

#3530

@pnrao1983 pnrao1983 added feature-request Used for new features in Teleport, improvements to current should be #enhancements c-extn Internal Customer Reference labels Mar 3, 2025
@zmb3
Copy link
Collaborator

zmb3 commented Mar 3, 2025

A bit of context:

Currently, session recordings cannot be located based on the commands executed

The reason you don't see this is because session recordings capture the output that was observed on the PTY, not the commands that were executed.

It's true that for simple use cases involving a well-behaved user that you can attempt to determine what commands were executed based on the contents of the PTY output, but this does not hold up against a user looking to hide their tracks and can't be counted on as a security feature.

We will likely look into some form of recording summarization (see #47083), which is adjacent but not identical to this request.

Another option is tsh play --format=text piped to grep.

Lastly, the session recording viewer in the web UI is searchable via cmd+f.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c-extn Internal Customer Reference feature-request Used for new features in Teleport, improvements to current should be #enhancements
Projects
None yet
Development

No branches or pull requests

2 participants