开启APIServer审计日志 legacy kubelet identity verbs: ["get"] resources: group: "" core resources: ["nodes"] level: None userGroups: ["system:nodes"] verbs: ["get"] resources: group: "" core resources: ["nodes"] level: None users: system:kubecontrollermanager system:kubescheduler system:serviceaccount:kubesystem:endpointcontroller verbs: ["get", "update"] namespaces: ["kubesystem"] resources: group: "" core resources: ["endpoints"] level: None users: ["system:apiserver"] verbs: ["get"] resources: group: "" core resources: ["namespaces"] 不要记录这些只读URL。 level: None nonResourceURLs: /healthz /version /swagger 不要记录事件请求。 level: None resources: group: "" core resources: ["events"] 机密、配置映射和令牌审查可以包含敏感和二进制数据, 因此,只能在元数据级别进行日志记录。 level: Metadata resources: group: "" core resources: ["secrets", "configmaps"] group: authentication.k8s.io resources: ["tokenreviews"] level: Request verbs: ["get", "list", "watch"] resources: group: "" core group: "admissionregistration.k8s.io" group: "apps" group: "authentication.k8s.io" group: "authorization.k8s.io" group: "autoscaling" group: "batch" group: "certificates.k8s.io" group: "extensions" group: "networking.k8s.io" group: "policy" group: "rbac.authorization.k8s.io" group: "settings.k8s.io" group: "storage.k8s.io" 已知API的默认级别。 level: RequestResponse resources: group: ""