Workload location | File and block storage |
Audit log source | |
Audited operations |
|
CRUD operations on the project network policy
Log type: KRM API management plane audit logs.
Fields in the log entry that contain audit information | ||
---|---|---|
Audit metadata | Audit field name | Value |
User or service identity | user | For example, "user": { "uid": "6e805ff0-3f8c-4073-b4e1-6a0582ff1263", "username": "system:serviceaccount:gpc-system:fleet-admin-controller", "extra": { "authentication.kubernetes.io/pod-uid": [ "45ce2b16-3584-448e-8caf-49cb299dfb55" ], "authentication.kubernetes.io/pod-name": [ "fleet-admin-controller-5b5d848876-764mt" ] }, "groups": [ "system:serviceaccounts", "system:serviceaccounts:gpc-system", "system:authenticated" ] } |
Target (Fields and values that call the API) | requestURI |
|
Action (Fields containing the performed operation) | verb | For example,
|
Event timestamp | requestReceivedTimestamp | For example,
|
Source of action | sourceIPs | For example, "sourceIPs": [ "10.253.164.215" ] |
Outcome | stage | For example,
|
Other fields | Not applicable | Not applicable |
Example log
{ "auditID": "ff8266f6-685f-4239-9ab8-c55083d575e0", "responseStatus": { "code": 200, "metadata": {} }, "level": "Metadata", "requestURI": "/apis/networking.gdc.goog/v1alpha1/namespaces/platform-obs/projectnetworkpolicies/base-policy-allow-intra-project-traffic/status", "user": { "uid": "6e805ff0-3f8c-4073-b4e1-6a0582ff1263", "username": "system:serviceaccount:gpc-system:fleet-admin-controller", "extra": { "authentication.kubernetes.io/pod-uid": [ "45ce2b16-3584-448e-8caf-49cb299dfb55" ], "authentication.kubernetes.io/pod-name": [ "fleet-admin-controller-5b5d848876-764mt" ] }, "groups": [ "system:serviceaccounts", "system:serviceaccounts:gpc-system", "system:authenticated" ] }, "_gdch_cluster": "org-1-admin", "objectRef": { "resource": "projectnetworkpolicies", "apiGroup": "networking.gdc.goog", "name": "base-policy-allow-intra-project-traffic", "apiVersion": "v1alpha1", "namespace": "platform-obs", "subresource": "status" }, "verb": "patch", "kind": "Event", "_gdch_fluentbit_pod": "anthos-audit-logs-forwarder-4267r", "stage": "ResponseComplete", "apiVersion": "audit.k8s.io/v1", "requestReceivedTimestamp": "2022-12-09T04:21:55.497089Z", "sourceIPs": [ "10.253.164.215" ], "userAgent": "fleet-admin-cm/v0.0.0 (linux/amd64) kubernetes/$Format", "stageTimestamp": "2022-12-09T04:21:55.505045Z", "annotations": { "authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"fleet-admin-controller\" of ClusterRole \"fleet-admin-controller\" to ServiceAccount \"fleet-admin-controller/gpc-system\"", "authorization.k8s.io/decision": "allow" }, "_gdch_service_name": "apiserver" }
CRUD operations on the load balancer
Log type: KRM API management plane audit logs.
Fields in the log entry that contain audit information | ||
---|---|---|
Audit metadata | Audit field name | Value |
User or service identity | user | For example, "user": { "groups": [ "system:masters", "system:authenticated" ], "username": "kubernetes-admin" } |
Target (Fields and values that call the API) | objectRef.resource | "objectRef": { "resource": "services" } |
Action (Fields containing the performed operation) | verb | For example,
|
Event timestamp | requestReceivedTimestamp | For example,
|
Source of action | sourceIPs | For example, "sourceIPs": [ "10.200.0.5" ] |
Outcome | stage | For example,
|
Other fields | Not applicable | Not applicable |
Example log
{ "apiVersion": "audit.k8s.io/v1", "level": "Metadata", "_gdch_cluster": "org-1-admin", "auditID": "113e562b-0576-4b97-bc5f-168a60428f6d", "user": { "groups": [ "system:masters", "system:authenticated" ], "username": "kubernetes-admin" }, "stageTimestamp": "2022-12-09T04:29:53.579903Z", "sourceIPs": [ "10.200.0.5" ], "responseStatus": { "code": 200, "metadata": {} }, "annotations": { "authorization.k8s.io/decision": "allow", "authorization.k8s.io/reason": "" }, "stage": "ResponseComplete", "requestURI": "/api/v1/namespaces/harbor-system/services/harbor-harbor-harbor-core", "_gdch_fluentbit_pod": "anthos-audit-logs-forwarder-8kc9n", "verb": "get", "objectRef": { "apiVersion": "v1", "apiGroup": "UNKNOWN", "resource": "services", "namespace": "harbor-system", "name": "harbor-harbor-harbor-core" }, "userAgent": "root-admin-cm/v0.0.0 (linux/amd64) kubernetes/$Format", "kind": "Event", "requestReceivedTimestamp": "2022-12-09T04:29:53.577417Z", "_gdch_service_name": "apiserver" }