From 6b6bfb37fbd7e3f4bac4e27fb40599b5911f5e74 Mon Sep 17 00:00:00 2001 From: Davanum Srinivas Date: Wed, 2 Jan 2019 10:24:29 -0500 Subject: [PATCH] Add minimal audit policy to local-up-cluster Change-Id: Ia2cdb5a6a891665ece5365698f2989ba3782a5ec --- hack/local-up-cluster.sh | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/hack/local-up-cluster.sh b/hack/local-up-cluster.sh index 0ba8ef2100..dd9e5a664b 100755 --- a/hack/local-up-cluster.sh +++ b/hack/local-up-cluster.sh @@ -116,6 +116,9 @@ START_MODE=${START_MODE:-"all"} # A list of controllers to enable KUBE_CONTROLLERS="${KUBE_CONTROLLERS:-"*"}" +# Audit policy +AUDIT_POLICY_FILE=${AUDIT_POLICY_FILE:-""} + # sanity check for OpenStack provider if [ "${CLOUD_PROVIDER}" == "openstack" ]; then if [ "${CLOUD_CONFIG}" == "" ]; then @@ -552,6 +555,17 @@ function start_apiserver { cloud_config_arg="--cloud-provider=external" fi + if [[ -n "${AUDIT_POLICY_FILE}" ]]; then + cat < /tmp/kube-audit-policy-file +# Log all requests at the Metadata level. +apiVersion: audit.k8s.io/v1 +kind: Policy +rules: +- level: Metadata +EOF + AUDIT_POLICY_FILE="/tmp/kube-audit-policy-file" + fi + APISERVER_LOG=${LOG_DIR}/kube-apiserver.log ${CONTROLPLANE_SUDO} "${GO_OUT}/hyperkube" apiserver ${authorizer_arg} ${priv_arg} ${runtime_config} \ ${cloud_config_arg} \ @@ -559,6 +573,8 @@ function start_apiserver { ${node_port_range} \ --v=${LOG_LEVEL} \ --vmodule="${LOG_SPEC}" \ + --audit-policy-file="${AUDIT_POLICY_FILE}" \ + --audit-log-path=${LOG_DIR}/kube-apiserver-audit.log \ --cert-dir="${CERT_DIR}" \ --client-ca-file="${CERT_DIR}/client-ca.crt" \ --kubelet-client-certificate="${CERT_DIR}/client-kube-apiserver.crt" \