I would like to define policy for audit log that will include information only regarding pod creation. I would like to make sure that all the audit logs wont appear. how can i find all the options that the policy can have? I would like to have only
- level: RequestResponse
resources:
- group: ""
# Resource "pods" doesn't match requests to any subresource of pods,
# which is consistent with the RBAC policy.
resources: ["pods"]
I used k8s formal site and use their example, I changed everything to "None" except of the "Pods" rule, and still i got a lot of other logs not related to pods.
my policy is:
omitStages:
- "RequestReceived"
rules:
# Log pod changes at RequestResponse level
- level: RequestResponse
resources:
- group: ""
resources: ["pods"]
- level: None
resources:
- group: ""
resources: ["pods/log", "pods/status"]
- level: None
resources:
- group: ""
resources: ["configmaps"]
resourceNames: ["controller-leader"]
- level: None
users: ["system:kube-proxy"]
verbs: ["watch"]
resources:
- group: "" # core API group
resources: ["endpoints", "services"]
- level: None
userGroups: ["system:authenticated"]
nonResourceURLs:
- "/api*" # Wildcard matching.
- "/version"
# Log the request body of configmap changes in kube-system.
- level: None
resources:
- group: "" # core API group
resources: ["configmaps"]
- level: None
resources:
- group: "" # core API group
resources: ["secrets", "configmaps"]
- level: None
resources:
- group: "" # core API group
- group: "extensions" # Version of group should NOT be included.
- level: None
# Long-running requests like watches that fall under this rule will not
# generate an audit event in RequestReceived.
omitStages:
- "RequestReceived"```