Configure Kubernetes Audit Policy
Configure Kubernetes audit policy for control plane nodes to enable comprehensive logging and monitoring
Kubernetes Audit Policy Support
EKS Anywhere configures a default audit policy for all clusters to provide basic logging and monitoring of API server requests. This default policy covers essential security events and resource access patterns.
Note
All EKS Anywhere clusters include audit logging with a sensible default policy. TheauditPolicyContent field is only needed if you want to customize the audit policy beyond the default configuration.
Customizing Audit Policy (Optional)
If you need to customize the audit policy beyond the default configuration, you can override it by adding the auditPolicyContent field to the controlPlaneConfiguration section of your cluster configuration:
apiVersion: anywhere.eks.amazonaws.com/v1alpha1
kind: Cluster
metadata:
name: my-cluster
spec:
controlPlaneConfiguration:
count: 1
endpoint:
host: "192.168.1.100"
machineGroupRef:
kind: VSphereMachineConfig
name: my-cluster-control-plane
auditPolicyContent: |
apiVersion: audit.k8s.io/v1
kind: Policy
rules:
- level: RequestResponse
resources:
- group: ""
resources:
- pods
- services
- secrets
- configmaps
Updating Audit Policy
To modify the audit policy on an existing cluster:
- Add/Update the
auditPolicyContentin your cluster configuration file - Run the cluster upgrade command:
eksctl anywhere upgrade cluster -f my-cluster.yaml
The upgrade process will rollout all control plane nodes with updated audit policy configuration.