Skip to content

Commit aad80e2

Browse files
committed
Enable full advanced audit in origin
1 parent b797b97 commit aad80e2

File tree

7 files changed

+106
-19
lines changed

7 files changed

+106
-19
lines changed

contrib/completions/bash/openshift

+4
Original file line numberDiff line numberDiff line change
@@ -37661,6 +37661,8 @@ _openshift_start_kubernetes_apiserver()
3766137661
local_nonpersistent_flags+=("--anonymous-auth")
3766237662
flags+=("--apiserver-count=")
3766337663
local_nonpersistent_flags+=("--apiserver-count=")
37664+
flags+=("--audit-log-format=")
37665+
local_nonpersistent_flags+=("--audit-log-format=")
3766437666
flags+=("--audit-log-maxage=")
3766537667
local_nonpersistent_flags+=("--audit-log-maxage=")
3766637668
flags+=("--audit-log-maxbackup=")
@@ -38717,6 +38719,8 @@ _openshift_start_template-service-broker()
3871738719
flags_with_completion=()
3871838720
flags_completion=()
3871938721

38722+
flags+=("--audit-log-format=")
38723+
local_nonpersistent_flags+=("--audit-log-format=")
3872038724
flags+=("--audit-log-maxage=")
3872138725
local_nonpersistent_flags+=("--audit-log-maxage=")
3872238726
flags+=("--audit-log-maxbackup=")

contrib/completions/zsh/openshift

+4
Original file line numberDiff line numberDiff line change
@@ -37810,6 +37810,8 @@ _openshift_start_kubernetes_apiserver()
3781037810
local_nonpersistent_flags+=("--anonymous-auth")
3781137811
flags+=("--apiserver-count=")
3781237812
local_nonpersistent_flags+=("--apiserver-count=")
37813+
flags+=("--audit-log-format=")
37814+
local_nonpersistent_flags+=("--audit-log-format=")
3781337815
flags+=("--audit-log-maxage=")
3781437816
local_nonpersistent_flags+=("--audit-log-maxage=")
3781537817
flags+=("--audit-log-maxbackup=")
@@ -38866,6 +38868,8 @@ _openshift_start_template-service-broker()
3886638868
flags_with_completion=()
3886738869
flags_completion=()
3886838870

38871+
flags+=("--audit-log-format=")
38872+
local_nonpersistent_flags+=("--audit-log-format=")
3886938873
flags+=("--audit-log-maxage=")
3887038874
local_nonpersistent_flags+=("--audit-log-maxage=")
3887138875
flags+=("--audit-log-maxbackup=")

pkg/cmd/server/api/types.go

+11-1
Original file line numberDiff line numberDiff line change
@@ -464,7 +464,6 @@ type AggregatorConfig struct {
464464
// AuditConfig holds configuration for the audit capabilities
465465
type AuditConfig struct {
466466
// If this flag is set, audit log will be printed in the logs.
467-
// The logs contains, method, user and a requested URL.
468467
Enabled bool
469468
// All requests coming to the apiserver will be logged to this file.
470469
AuditFilePath string
@@ -474,6 +473,17 @@ type AuditConfig struct {
474473
MaximumRetainedFiles int
475474
// Maximum size in megabytes of the log file before it gets rotated. Defaults to 100MB.
476475
MaximumFileSizeMegabytes int
476+
477+
// Path to the file that defines the audit policy configuration.
478+
PolicyFile string
479+
480+
// Format of saved audits (legacy or json).
481+
LogFormat string
482+
483+
// Path to a kubeconfig formatted filpe that defines the audit webhook configuration.
484+
WebhookConfigFile string
485+
// Strategy for sending audit events (block or batch).
486+
WebhookMode string
477487
}
478488

479489
// JenkinsPipelineConfig holds configuration for the Jenkins pipeline strategy

pkg/cmd/server/api/v1/swagger_doc.go

+4
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,10 @@ var map_AuditConfig = map[string]string{
9090
"maximumFileRetentionDays": "Maximum number of days to retain old log files based on the timestamp encoded in their filename.",
9191
"maximumRetainedFiles": "Maximum number of old log files to retain.",
9292
"maximumFileSizeMegabytes": "Maximum size in megabytes of the log file before it gets rotated. Defaults to 100MB.",
93+
"policyFile": "Path to the file that defines the audit policy configuration.",
94+
"logFormat": "Format of saved audits (legacy or json).",
95+
"webhookConfigFile": "Path to a kubeconfig formatted filpe that defines the audit webhook configuration.",
96+
"webhookMode": "Strategy for sending audit events (block or batch).",
9397
}
9498

9599
func (AuditConfig) SwaggerDoc() map[string]string {

pkg/cmd/server/api/v1/types.go

+11
Original file line numberDiff line numberDiff line change
@@ -331,6 +331,17 @@ type AuditConfig struct {
331331
MaximumRetainedFiles int `json:"maximumRetainedFiles"`
332332
// Maximum size in megabytes of the log file before it gets rotated. Defaults to 100MB.
333333
MaximumFileSizeMegabytes int `json:"maximumFileSizeMegabytes"`
334+
335+
// Path to the file that defines the audit policy configuration.
336+
PolicyFile string `json:"policyFile"`
337+
338+
// Format of saved audits (legacy or json).
339+
LogFormat string `json:"logFormat"`
340+
341+
// Path to a kubeconfig formatted filpe that defines the audit webhook configuration.
342+
WebhookConfigFile string `json:"webhookConfigFile"`
343+
// Strategy for sending audit events (block or batch).
344+
WebhookMode string `json:"webhookMode"`
334345
}
335346

336347
// JenkinsPipelineConfig holds configuration for the Jenkins pipeline strategy

pkg/cmd/server/api/validation/master.go

+24
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ import (
1414
"k8s.io/apimachinery/pkg/util/sets"
1515
kuval "k8s.io/apimachinery/pkg/util/validation"
1616
"k8s.io/apimachinery/pkg/util/validation/field"
17+
auditpolicy "k8s.io/apiserver/pkg/audit/policy"
18+
auditlog "k8s.io/apiserver/plugin/pkg/audit/log"
19+
auditwebhook "k8s.io/apiserver/plugin/pkg/audit/webhook"
1720
apiserveroptions "k8s.io/kubernetes/cmd/kube-apiserver/app/options"
1821
kcmoptions "k8s.io/kubernetes/cmd/kube-controller-manager/app/options"
1922
kvalidation "k8s.io/kubernetes/pkg/api/validation"
@@ -238,6 +241,9 @@ func ValidateAggregatorConfig(config api.AggregatorConfig, fldPath *field.Path)
238241

239242
func ValidateAuditConfig(config api.AuditConfig, fldPath *field.Path) ValidationResults {
240243
validationResults := ValidationResults{}
244+
if !config.Enabled {
245+
return validationResults
246+
}
241247

242248
if len(config.AuditFilePath) == 0 {
243249
// for backwards compatibility reasons we can't error this out
@@ -253,6 +259,24 @@ func ValidateAuditConfig(config api.AuditConfig, fldPath *field.Path) Validation
253259
validationResults.AddErrors(field.Invalid(fldPath.Child("maximumFileSizeMegabytes"), config.MaximumFileSizeMegabytes, "must be greater than or equal to 0"))
254260
}
255261

262+
if len(config.PolicyFile) > 0 {
263+
policy, err := auditpolicy.LoadPolicyFromFile(config.PolicyFile)
264+
if err != nil {
265+
validationResults.AddErrors(field.Invalid(fldPath.Child("policyFile"), config.PolicyFile, err.Error()))
266+
}
267+
if len(policy.Rules) == 0 {
268+
validationResults.AddErrors(field.Invalid(fldPath.Child("policyFile"), config.PolicyFile, "a policy file with 0 policies is not valid"))
269+
}
270+
}
271+
if len(config.LogFormat) > 0 && config.LogFormat != auditlog.FormatLegacy && config.LogFormat != auditlog.FormatJson {
272+
validationResults.AddErrors(field.Invalid(fldPath.Child("logFormat"), config.LogFormat,
273+
fmt.Sprintf("invalid audit log format, allowed formats are %q", strings.Join(auditlog.AllowedFormats, ","))))
274+
}
275+
if len(config.WebhookMode) > 0 && config.WebhookMode != auditwebhook.ModeBatch && config.WebhookMode != auditwebhook.ModeBlocking {
276+
validationResults.AddErrors(field.Invalid(fldPath.Child("logFormat"), config.WebhookMode,
277+
fmt.Sprintf("invalid audit webhook mode, allowed modes are %q", strings.Join(auditwebhook.AllowedModes, ","))))
278+
}
279+
256280
return validationResults
257281
}
258282

pkg/cmd/server/origin/master.go

+48-18
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,14 @@ import (
1414

1515
apiextensionsinformers "k8s.io/apiextensions-apiserver/pkg/client/informers/internalversion"
1616
auditinternal "k8s.io/apiserver/pkg/apis/audit"
17+
"k8s.io/apiserver/pkg/audit"
1718
auditpolicy "k8s.io/apiserver/pkg/audit/policy"
1819
apifilters "k8s.io/apiserver/pkg/endpoints/filters"
1920
apirequest "k8s.io/apiserver/pkg/endpoints/request"
2021
apiserver "k8s.io/apiserver/pkg/server"
2122
apiserverfilters "k8s.io/apiserver/pkg/server/filters"
2223
auditlog "k8s.io/apiserver/plugin/pkg/audit/log"
24+
auditwebhook "k8s.io/apiserver/plugin/pkg/audit/webhook"
2325
aggregatorapiserver "k8s.io/kube-aggregator/pkg/apiserver"
2426
kubeapiserver "k8s.io/kubernetes/pkg/master"
2527
kcorestorage "k8s.io/kubernetes/pkg/registry/core/rest"
@@ -291,24 +293,8 @@ func (c *MasterConfig) buildHandlerChain() (func(apiHandler http.Handler, kc *ap
291293
handler = serverhandlers.ImpersonationFilter(handler, c.Authorizer, cache.NewGroupCache(c.UserInformers.User().InternalVersion().Groups()), genericConfig.RequestContextMapper)
292294
// audit handler must comes before the impersonationFilter to read the original user
293295
if c.Options.AuditConfig.Enabled {
294-
var writer io.Writer
295-
if len(c.Options.AuditConfig.AuditFilePath) > 0 {
296-
writer = &lumberjack.Logger{
297-
Filename: c.Options.AuditConfig.AuditFilePath,
298-
MaxAge: c.Options.AuditConfig.MaximumFileRetentionDays,
299-
MaxBackups: c.Options.AuditConfig.MaximumRetainedFiles,
300-
MaxSize: c.Options.AuditConfig.MaximumFileSizeMegabytes,
301-
}
302-
} else {
303-
// backwards compatible writer to regular log
304-
writer = cmdutil.NewGLogWriterV(0)
305-
}
306-
c.AuditBackend = auditlog.NewBackend(writer)
307-
auditPolicyChecker := auditpolicy.NewChecker(&auditinternal.Policy{
308-
// This is for backwards compatibility maintaining the old visibility, ie. just
309-
// raw overview of the requests comming in.
310-
Rules: []auditinternal.PolicyRule{{Level: auditinternal.LevelMetadata}},
311-
})
296+
var auditPolicyChecker auditpolicy.Checker
297+
c.AuditBackend, auditPolicyChecker = c.prepareAuditAssets()
312298
handler = apifilters.WithAudit(handler, genericConfig.RequestContextMapper, c.AuditBackend, auditPolicyChecker, genericConfig.LongRunningFunc)
313299
}
314300
handler = apifilters.WithAuthentication(handler, c.RequestContextMapper, c.Authenticator, apifilters.Unauthorized(false))
@@ -340,6 +326,50 @@ func (c *MasterConfig) buildHandlerChain() (func(apiHandler http.Handler, kc *ap
340326
nil
341327
}
342328

329+
func (c *MasterConfig) prepareAuditAssets() (audit.Backend, auditpolicy.Checker) {
330+
var writer io.Writer
331+
if len(c.Options.AuditConfig.AuditFilePath) > 0 {
332+
writer = &lumberjack.Logger{
333+
Filename: c.Options.AuditConfig.AuditFilePath,
334+
MaxAge: c.Options.AuditConfig.MaximumFileRetentionDays,
335+
MaxBackups: c.Options.AuditConfig.MaximumRetainedFiles,
336+
MaxSize: c.Options.AuditConfig.MaximumFileSizeMegabytes,
337+
}
338+
} else {
339+
// backwards compatible writer to regular log
340+
writer = cmdutil.NewGLogWriterV(0)
341+
}
342+
var backend audit.Backend = auditlog.NewBackend(writer, auditlog.FormatLegacy)
343+
policyChecker := auditpolicy.NewChecker(&auditinternal.Policy{
344+
// This is for backwards compatibility maintaining the old visibility, ie. just
345+
// raw overview of the requests comming in.
346+
Rules: []auditinternal.PolicyRule{{Level: auditinternal.LevelMetadata}},
347+
})
348+
349+
// when policy file is defined we enable the advanced auditing
350+
if len(c.Options.AuditConfig.PolicyFile) > 0 {
351+
// policy configuration
352+
p, _ := auditpolicy.LoadPolicyFromFile(c.Options.AuditConfig.PolicyFile)
353+
policyChecker = auditpolicy.NewChecker(p)
354+
355+
// log configuration, only when file path was provided
356+
if len(c.Options.AuditConfig.AuditFilePath) > 0 {
357+
backend = auditlog.NewBackend(writer, c.Options.AuditConfig.LogFormat)
358+
}
359+
360+
// webhook configuration, only when config file was provided
361+
if len(c.Options.AuditConfig.WebhookConfigFile) > 0 {
362+
webhook, err := auditwebhook.NewBackend(c.Options.AuditConfig.WebhookConfigFile, c.Options.AuditConfig.WebhookMode)
363+
if err != nil {
364+
glog.Fatalf("Audit webhook initialization failed: %v", err)
365+
}
366+
backend = audit.Union(backend, webhook)
367+
}
368+
}
369+
370+
return backend, policyChecker
371+
}
372+
343373
func (c *MasterConfig) withConsoleRedirection(handler, assetServerHandler http.Handler, assetConfig *configapi.AssetConfig) http.Handler {
344374
if assetConfig == nil {
345375
return handler

0 commit comments

Comments
 (0)