-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use admission webhooks as an alternative to audit logs #18
Comments
The Nginx on our apisnoop test rig has been updated to proxy /audit to test-server.go. The following should work on any kubernetes cluster that supports dynamic admission controller webhooks:
Tomorrow we can see how much this differs from audit-logs to make it easier to contribute logs. |
|
Will table this for a while until the dust settles regarding dynamic audit logging: kubernetes/community#2188 This approach also doesn't yet support user-agent. |
We can probably implement this now, pulling into current cycle for prioritisation. |
Just realized this use of AdmissionWebhooks to create an audit trail is the conversation that prompted the creation of DynamicAuditSinks / webhooks. |
Currently auditing webhooks are difficult to use as they require configuration before kubernetes is started. There are plans to allow configuration of webhooks at runtime (maybe v1.12).
Audit logs require ssh access to the master and require manual collection.
And so, we are looking for other ways of collecting request information.
One possible way would be using Admission webhooks
https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#prerequisites
An admission webhook that
could be something worth exploring
The text was updated successfully, but these errors were encountered: