Configure the Audit Log Path
An XCCDF Rule
Description
To enable auditing on the OpenShift API Server, the audit log path must be set.
Edit the openshift-apiserver
configmap
and set the audit-log-path
to a suitable path and file
where audit logs should be written. For example:
"apiServerArguments":{ ... "audit-log-path":"/var/log/openshift-apiserver/audit.log", ...
warning alert: Warning
This rule's check operates on the cluster configuration dump.
Therefore, you need to use a tool that can query the OCP API, retrieve the
/api/v1/namespaces/openshift-apiserver/configmaps/config
API endpoint to the local /api/v1/namespaces/openshift-apiserver/configmaps/config
file. Rationale
Auditing of the API Server is not enabled by default. Auditing the API Server provides a security-relevant chronological set of records documenting the sequence of activities that have affected the system by users, administrators, or other system components.
- ID
- xccdf_org.ssgproject.content_rule_openshift_api_server_audit_log_path
- Severity
- High
- References
- Updated