You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/concepts/security/controlling-access.md
+1-5Lines changed: 1 addition & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,16 +129,12 @@ The available Admission Control modules are described in [Admission Controllers]
129
129
Once a request passes all admission controllers, it is validated using the validation routines
130
130
for the corresponding API object, and then written to the object store (shown as step **4**).
131
131
132
-
133
132
## Auditing
134
133
135
134
Kubernetes auditing provides a security-relevant, chronological set of records documenting the sequence of actions in a cluster.
136
135
The cluster audits the activities generated by users, by applications that use the Kubernetes API, and by the control plane itself.
137
-
Each request on each stage of its execution generates an audit event, which is then pre-processed according to a certain policy and written to a backend.
138
-
The policy determines what's recorded when an event is processed and it's compared against the list of rules in order. The first matching rule sets the audit level of the event.
139
-
The defined audit levels are: None, Metadata, Request and RequestResponse.
140
-
The Audit backends persist audit events to an external storage. By default kube-apiserver provides two backends: log and webhook backend.
141
136
137
+
For more information, see "[Auditing](https://kubernetes.io/docs/tasks/debug-application-cluster/audit/)".
0 commit comments