This repository has been archived by the owner on Mar 2, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 44
Add audit log support #138
Labels
Comments
cc: @erictcgs |
From a UX perspective, should a single flag control this behavior (e.g. |
alexbrand
added a commit
to alexbrand/wardroom
that referenced
this issue
May 1, 2019
Enable Kubernetes API audit logging with a default logging policy. When desired, users can provide their custom audit policy rules using an ansible variable. Fixes vmware-archive#138 Signed-off-by: Alexander Brand <alexbrand09@gmail.com>
alexbrand
added a commit
to alexbrand/wardroom
that referenced
this issue
May 1, 2019
Enable Kubernetes API audit logging with a default logging policy. When desired, users can provide their custom audit policy rules using an ansible variable. Fixes vmware-archive#138 Signed-off-by: Alexander Brand <alexbrand09@gmail.com>
alexbrand
added a commit
to alexbrand/wardroom
that referenced
this issue
May 1, 2019
Enable Kubernetes API audit logging with a default logging policy. When desired, users can provide their custom audit policy rules using an ansible variable. Fixes vmware-archive#138 Signed-off-by: Alexander Brand <alexbrand09@gmail.com>
alexbrand
added a commit
to alexbrand/wardroom
that referenced
this issue
May 1, 2019
Enable Kubernetes API audit logging with a default logging policy. When desired, users can provide their custom audit policy rules using an ansible variable. Fixes vmware-archive#138 Signed-off-by: Alexander Brand <alexbrand09@gmail.com>
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Wardroom should support enabling api-server audit log functionality. This change should template-ize the audit log configuration and add the necessary volume mounts into the api-server container by way of the kubernetes_common_kubeadm_config.
The text was updated successfully, but these errors were encountered: