-
Feature Request
-
Resolution: Done
-
Blocker
-
None
-
None
-
False
-
False
-
Undefined
-
-
-
1. Proposed title of this feature request
[RFE] Audit commands run in the different console sessions of the OpenShift Console web interface
2. What is the nature and description of the request?
This is an spin off RFE from https://issues.redhat.com/browse/RFE-948
I am unsure if what's requested in 948 would cover OpenShift's web interface (the web console). Should this be covered by 948, feel free to close this request.
For security purposes it may be needed to audit activities done by users on the OCP cluster.
For auditing we mean recording actions done on the cluster (full description), results, who is doing that, when, ...., being able to correlate linked records
Current auditing feature does not allow to audit activities done inside pods/containers when executed from the OpenShift web interface / OpenShift web console.
3. Why does the customer need this?
Auditing is a security requirement in our high regulated security environment; for example we need to know who ran a command inside a pod via the web interface.
4. List any affected packages or components.
Pod/Container level
Node level
With regards to Node level, make sure to also audit actions on the node when executed through the web interface. It's possible to configure PAM to log all commands via the MachineConfigOperator: https://access.redhat.com/solutions/5920371 However, this does not seem to cover the OpenShift web console.