-
Epic
-
Resolution: Done
-
Major
-
None
-
Platform Audit Logs
-
3
-
False
-
False
-
NEW
-
Done
-
NEW
-
0% To Do, 0% In Progress, 100% Done
-
Undefined
Goals
Support collecting additional audit logs from other, platform related locations to enable security admins to fully audit the entire OpenShift Platform and its underlying infrastructure components.
Non-Goals
- General support for adjusting or adding more locations on-the-fly where we will collect audit logs from.
Motivation
Recently (OCP 4.8), the OVNKubernetes plugin introduced a new feature where audit logs can be collected which allows for gathering more information about network policies.
As with any other audit log, this is considered sensitive information and often has to be handled in a different pipeline than other container logs.
Alternatives
Customers in regulated industries will have to come up with their own log forwarding solution just for this type of log. Otherwise, they might use a side-car container to output the logs, which would forward them to the regular bucket of logs. Which, if found by an auditor, is considered a finding that might affect their compliance targets.
Acceptance Criteria
- It is expected that if these OVN audit logs (which are persisted in the /ovn/acl-audit-log.log file) are found, they will be collected, and can be forwarded using the audit inputRef.
Risk and Assumptions
Documentation Considerations
- Update the list of files we collect audit logs from.
Open Questions
Additional Notes
- blocks
-
OBSDA-81 Collect & forward OVN audit logs
- Closed
- is documented by
-
RHDEVDOCS-3162 Collect OVN Audit Logs
- Closed
- is related to
-
LOG-1592 Add sub-categories for log types
- Closed
- links to