- Lab
- A Cloud Guru
Configure Audit Logging in Kubernetes
Audit logging is essential to any Kubernetes security strategy. In this lab, you will have the opportunity to practice your skills with Kubernetes audit logging by configuring audit logging for a cluster.
Path Info
Table of Contents
-
Challenge
Implement Audit Policy Rules
Add the following rules to the audit policy.
Note: You can find an audit policy file located at
/etc/kubernetes/audit-policy.yaml
.- Log request and response bodies for all changes to namespaces.
- Log request bodies (but not response bodies) for changes to Pods and Services in the
web
namespace. - Log metadata for all changes to Secrets.
- Create a catch-all rule to log metadata for all other requests.
-
Challenge
Configure Audit Logging
Configure audit logging in the following way:
Note: kube-apiserver is already configured to mount both the audit policy file and the log output file.
- Use the audit policy file located at
/etc/kubernetes/audit-policy.yaml
. - Output logs to the file located at
/var/log/kubernetes/k8s-audit.log
. - Keep old log files for a maximum of
60
days. - Keep a maximum of
1
old log file.
- Use the audit policy file located at
What's a lab?
Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.