Skip to content

Commit b831e96

Browse files
committed
[en] modify debug-cluster/audit
Signed-off-by: xin.li <[email protected]>
1 parent 6d9dea7 commit b831e96

File tree

14 files changed

+16
-16
lines changed

14 files changed

+16
-16
lines changed

content/en/blog/_posts/2017-06-00-Kubernetes-1-7-Security-Hardening-Stateful-Application-Extensibility-Updates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Security:
1919
- [Node authorizer](/docs/reference/access-authn-authz/node/) and admission control plugin are new additions that restrict kubelet’s access to secrets, pods and other objects based on its node.
2020
- [Encryption for Secrets](/docs/tasks/administer-cluster/encrypt-data/), and other resources in etcd, is now available as alpha.&nbsp;
2121
- [Kubelet TLS bootstrapping](/docs/admin/kubelet-tls-bootstrapping/) now supports client and server certificate rotation.
22-
- [Audit logs](/docs/tasks/debug-application-cluster/audit/) stored by the API server are now more customizable and extensible with support for event filtering and webhooks. They also provide richer data for system audit.
22+
- [Audit logs](/docs/tasks/debug/debug-cluster/audit/) stored by the API server are now more customizable and extensible with support for event filtering and webhooks. They also provide richer data for system audit.
2323

2424
Stateful workloads:
2525

content/en/blog/_posts/2017-12-00-Using-Ebpf-In-Kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ To achieve the best possible isolation, each function call would have to happen
117117
By using Landlock, we could isolate function calls from each other within the same container, making a temporary file created by one function call inaccessible to the next function call, for example. Integration between Landlock and technologies like Kubernetes-based serverless frameworks would be a ripe area for further exploration.
118118

119119
## Auditing kubectl-exec with eBPF
120-
In Kubernetes 1.7 the [audit proposal](/docs/tasks/debug-application-cluster/audit/) started making its way in. It's currently pre-stable with plans to be stable in the 1.10 release. As the name implies, it allows administrators to log and audit events that take place in a Kubernetes cluster.
120+
In Kubernetes 1.7 the [audit proposal](/docs/tasks/debug/debug-cluster/audit/) started making its way in. It's currently pre-stable with plans to be stable in the 1.10 release. As the name implies, it allows administrators to log and audit events that take place in a Kubernetes cluster.
121121

122122
While these events log Kubernetes events, they don't currently provide the level of visibility that some may require. For example, while we can see that someone has used `kubectl exec` to enter a container, we are not able to see what commands were executed in that session. With eBPF one can attach a BPF program that would record any commands executed in the `kubectl exec` session and pass those commands to a user-space program that logs those events. We could then play that session back and know the exact sequence of events that took place.
123123
## Learn more about eBPF

content/en/blog/_posts/2018-07-18-11-ways-not-to-get-hacked.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ There are plenty of [good examples](https://docs.bitnami.com/kubernetes/how-to/c
6666

6767
Incorrect or excessively permissive RBAC policies are a security threat in case of a compromised pod. Maintaining least privilege, and continuously reviewing and improving RBAC rules, should be considered part of the "technical debt hygiene" that teams build into their development lifecycle.
6868

69-
[Audit Logging](/docs/tasks/debug-application-cluster/audit/) (beta in 1.10) provides customisable API logging at the payload (e.g. request and response), and also metadata levels. Log levels can be tuned to your organisation&#39;s security policy - [GKE](https://cloud.google.com/kubernetes-engine/docs/how-to/audit-logging#audit_policy) provides sane defaults to get you started.
69+
[Audit Logging](/docs/tasks/debug/debug-cluster/audit/) (beta in 1.10) provides customisable API logging at the payload (e.g. request and response), and also metadata levels. Log levels can be tuned to your organisation&#39;s security policy - [GKE](https://cloud.google.com/kubernetes-engine/docs/how-to/audit-logging#audit_policy) provides sane defaults to get you started.
7070

7171
For read requests such as get, list, and watch, only the request object is saved in the audit logs; the response object is not. For requests involving sensitive data such as Secret and ConfigMap, only the metadata is exported. For all other requests, both request and response objects are saved in audit logs.
7272

content/en/blog/_posts/2020-09-03-warnings/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ group_right() apiserver_request_total
177177

178178
Metrics are a fast way to check whether deprecated APIs are being used, and at what rate,
179179
but they don't include enough information to identify particular clients or API objects.
180-
Starting in Kubernetes v1.19, [audit events](/docs/tasks/debug-application-cluster/audit/)
180+
Starting in Kubernetes v1.19, [audit events](/docs/tasks/debug/debug-cluster/audit/)
181181
for requests to deprecated APIs include an audit annotation of `"k8s.io/deprecated":"true"`.
182182
Administrators can use those audit events to identify specific clients or objects that need to be updated.
183183

content/en/blog/_posts/2020-11-18-cloud-native-security-for-your-cluster/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The paper attempts to _not_ focus on any specific [cloud native project](https:/
2020
When using Kubernetes as a workload orchestrator, some of the security controls this version of the whitepaper recommends are:
2121
* [Pod Security Policies](/docs/concepts/security/pod-security-policy/): Implement a single source of truth for “least privilege” workloads across the entire cluster
2222
* [Resource requests and limits](/docs/concepts/configuration/manage-resources-containers/#requests-and-limits): Apply requests (soft constraint) and limits (hard constraint) for shared resources such as memory and CPU
23-
* [Audit log analysis](/docs/tasks/debug-application-cluster/audit/): Enable Kubernetes API auditing and filtering for security relevant events
23+
* [Audit log analysis](/docs/tasks/debug/debug-cluster/audit/): Enable Kubernetes API auditing and filtering for security relevant events
2424
* [Control plane authentication and certificate root of trust](/docs/concepts/architecture/control-plane-node-communication/): Enable mutual TLS authentication with a trusted CA for communication within the cluster
2525
* [Secrets management](/docs/concepts/configuration/secret/): Integrate with a built-in or external secrets store
2626

content/en/blog/_posts/2021-10-05-nsa-cisa-hardening.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -317,7 +317,7 @@ RequestResponse's including metadata and request / response bodies. While helpfu
317317

318318
Each organization needs to evaluate their
319319
own threat model and build an audit policy that complements or helps troubleshooting incident response. Think
320-
about how someone would attack your organization and what audit trail could identify it. Review more advanced options for tuning audit logs in the official [audit logging documentation](/docs/tasks/debug-application-cluster/audit/#audit-policy).
320+
about how someone would attack your organization and what audit trail could identify it. Review more advanced options for tuning audit logs in the official [audit logging documentation](/docs/tasks/debug/debug-cluster/audit/#audit-policy).
321321
It's crucial to tune your audit logs to only include events that meet your threat model. A minimal audit policy that logs everything at `metadata` level can also be a good starting point.
322322

323323
Audit logging configurations can also be tested with

content/en/docs/concepts/cluster-administration/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Before choosing a guide, here are some considerations:
5959

6060
* [Using Sysctls in a Kubernetes Cluster](/docs/tasks/administer-cluster/sysctl-cluster/) describes to an administrator how to use the `sysctl` command-line tool to set kernel parameters .
6161

62-
* [Auditing](/docs/tasks/debug-application-cluster/audit/) describes how to interact with Kubernetes' audit logs.
62+
* [Auditing](/docs/tasks/debug/debug-cluster/audit/) describes how to interact with Kubernetes' audit logs.
6363

6464
### Securing the kubelet
6565
* [Control Plane-Node communication](/docs/concepts/architecture/control-plane-node-communication/)

content/en/docs/concepts/security/controlling-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ for the corresponding API object, and then written to the object store (shown as
134134
Kubernetes auditing provides a security-relevant, chronological set of records documenting the sequence of actions in a cluster.
135135
The cluster audits the activities generated by users, by applications that use the Kubernetes API, and by the control plane itself.
136136

137-
For more information, see [Auditing](/docs/tasks/debug-application-cluster/audit/).
137+
For more information, see [Auditing](/docs/tasks/debug/debug-cluster/audit/).
138138

139139
## API server ports and IPs
140140

content/en/docs/concepts/security/pod-security-admission.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ takes if a potential violation is detected:
8888
Mode | Description
8989
:---------|:------------
9090
**enforce** | Policy violations will cause the pod to be rejected.
91-
**audit** | Policy violations will trigger the addition of an audit annotation to the event recorded in the [audit log](/docs/tasks/debug-application-cluster/audit/), but are otherwise allowed.
91+
**audit** | Policy violations will trigger the addition of an audit annotation to the event recorded in the [audit log](/docs/tasks/debug/debug-cluster/audit/), but are otherwise allowed.
9292
**warn** | Policy violations will trigger a user-facing warning, but are otherwise allowed.
9393
{{< /table >}}
9494

content/en/docs/reference/access-authn-authz/extensible-admission-controllers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1396,7 +1396,7 @@ monitoring mechanisms help cluster admins to answer questions like:
13961396
Sometimes it's useful to know which mutating webhook mutated the object in a API request, and what change did the
13971397
webhook apply.
13981398

1399-
In v1.16+, kube-apiserver performs [auditing](/docs/tasks/debug-application-cluster/audit/) on each mutating webhook
1399+
In v1.16+, kube-apiserver performs [auditing](/docs/tasks/debug/debug-cluster/audit/) on each mutating webhook
14001400
invocation. Each invocation generates an auditing annotation
14011401
capturing if a request object is mutated by the invocation, and optionally generates an annotation capturing the applied
14021402
patch from the webhook admission response. The annotations are set in the audit event for given request on given stage of

0 commit comments

Comments
 (0)