Skip to content

Commit 8f79be4

Browse files
Merge pull request kubernetes#88 from JAORMX/audit-logs
Add audit logs to cluster-logging-log-forwarding enhancement proposal
2 parents b14bbc0 + 04b58fd commit 8f79be4

File tree

1 file changed

+11
-2
lines changed

1 file changed

+11
-2
lines changed

enhancements/cluster-logging/cluster-logging-log-forwarding.md

+11-2
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: cluster-logging-log-forwarding
33
authors:
44
- "@jcantrill"
5+
- "@jaosorior"
56
reviewers:
67
- "@bparees"
78
- "@ewolinetz"
@@ -63,18 +64,18 @@ It will not allow configuration of additional sources without further design con
6364
intended to provide a complex routing solution as one might achieve by using a custom collector configuration or a messaging solution (e.g. kafka).
6465
* It is not a goal for the tech-preview to support log forwarding outputs other then the ones identified for the goals. Admins can forward to their own fluentd via `forward`
6566
and then configure that fluentd to forward to any number of specific logstore outputs
66-
67+
* It is not a goal to provide secure storage for audit logs. If the deployer chooses to enable audit log forwarding, they need to make sure that the endpoint is compliant with governmental regulations and secure. The OpenShift logging Elasticsearch does not comply with those regulations.
6768

6869
## Proposal
6970

7071
Log forwarding will provide a declarative way to specify the outputs for specific types of logs using a 'pipeline'. A 'pipeline' defines simple routing for one source to one or more outputs. The source of logs are opinionated and well defined by cluster logging. The initial source types are as follows:
7172

7273
* `logs.app` - Container logs generated by user applications running on the platform, excluding infrastructure container applications
7374
* `logs.infra` - Logs generated by both infrastructure components running on the platform and OKD nodes (e.g. journal logs). "Infra" applications are defined as any pods which run in namespaces: `openshift*`, `kube*`, `default`.
75+
* `logs.audit` - Logs generated by the nodes' auditd (/var/log/audit/audit.log), audit logs from the kubeapi-server and the openshift-apiserver. This will not be forwarded by default.
7476

7577
Future types may be:
7678
* `events.kubernetes` - Kubernetes events
77-
* `audit.container-engine` - Container engine audit events
7879

7980
There are no assumptions regarding whether or not an endpoint is deployed on or off cluster. Endpoints off-cluster may require adminstrators to perform additional actions in order for logs to be forwarded (e.g. secret creation, opening port, enable global proxy configuration)
8081
Following is the list of supported endpoint types for this proposal:
@@ -92,6 +93,10 @@ This is a typical example of organizations that desires to re-use their existing
9293

9394
This is an example of an OKD cluster hosting solution where several organizations are each provided with a dedicated cluster. The organization requires access to application container logs but the host requires access to the infra structure logs.
9495

96+
#### As an OKD admin, I need to forward my audit logs to a secure SIEM that meets government regulations
97+
98+
This is often required for industries such as the US public sector, healthcare or financials. The logs will be forwarded to a government approved SIEM through secure means (mutual TLS).
99+
95100
### Implementation Details
96101

97102
#### Assumptions
@@ -154,6 +159,10 @@ spec:
154159
source: logs.infra:
155160
outputRefs:
156161
- elasticsearch-insecure
162+
- name: audit-logs
163+
source: logs.audit
164+
outputRefs:
165+
- secureforward-offcluster
157166
```
158167

159168
The generated collector configuration is something like the following. **Note:** the source definitions from prior releases remain unchanged:

0 commit comments

Comments
 (0)