一、背景
- 应安全规范,对 apiserver 核心组件,需要记录,"谁在什么时候操作了什么"
- 方便故障排查
二、操作步骤
apiserver 开启审计日志
在所有 master 节点执行
-
备份 配置文件
mkdir -p /home/clay/bak$(date +%F) cp /etc/kubernetes/manifests/kube-apiserver.yaml /home/clay/bak$(date +%F)
-
创建审计策略
mkdir /etc/kubernetes/audit/
vim /etc/kubernetes/audit/audit-policy.yaml
apiVersion: audit.k8s.io/v1beta1 # This is required. kind: Policy omitStages: - "RequestReceived" rules: - level: None users: ["system:kube-proxy"] verbs: ["watch"] resources: - group: "" # core resources: ["endpoints", "services"] - level: None users: ["system:unsecured"] namespaces: ["kube-system"] verbs: ["get"] resources: - group: "" # core resources: ["configmaps"] - level: None users: ["system:serviceaccount:kube-system:calico-node"] verbs: ["get","list"] - level: None users: ["kubelet"] # legacy kubelet identity verbs: ["get"] resources: - group: "" # core resources: ["nodes"] - level: None userGroups: ["system:nodes"] verbs: ["get"] resources: - group: "" # core resources: ["nodes"] - level: None users: - system:kube-controller-manager - system:kube-scheduler - system:serviceaccount:kube-system:endpoint-controller verbs: ["get", "update"] namespaces: ["kube-system"] resources: - group: "" # core resources: ["endpoints"] - level: None users: ["system:apiserver"] verbs: ["get"] resources: - group: "" # core resources: ["namespaces"] - level: None nonResourceURLs: - /healthz* - /version - /swagger* - level: None resources: - group: "" # core resources: ["events"] - level: Metadata resources: - group: "" # core resources: ["secrets", "configmaps"] - group: authentication.k8s.io resources: ["tokenreviews"] - level: Metadata
-
修改apiserver 配置文件
vim /etc/kubernetes/manifests/kube-apiserver.yaml
# 在spec.containers.command 最后新增 - --audit-policy-file=/etc/kubernetes/audit/audit-policy.yaml - --audit-log-maxage=7 - --audit-log-maxsize=200 - --audit-log-path=/var/log/apiserver/audit.log # 在spec.containers.volumeMounts 最后新增 - mountPath: /etc/kubernetes/audit name: audit readOnly: true - mountPath: /var/log/apiserver/ name: log # 在spec.volumes 最后新增 - hostPath: path: /etc/kubernetes/audit type: DirectoryOrCreate name: audit - hostPath: path: /var/log/apiserver type: DirectoryOrCreate name: log
使用 filebeat 收集审计日志到 elk 中
编写 yaml 文件
vim filebeat-configmap.yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: filebeat-config
namespace: audit
labels:
k8s-app: filebeat
kubernetes.io/cluster-service: "true"
app: filebeat-config
data:
filebeat.yml: |
filebeat.prospectors:
- input_type: log
enabled: true
tail_files: true
paths:
- /var/log/apiserver/*.log
output.kafka:
hosts: ["xxx:9092"]
topic: 'test_k8s_audit_log'
required_acks: 1
partition.round_robin:
reachable_only: false
compression: gzip
max_message_bytes: 10000000
vim filebeat-ds.yaml
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: filebeat
namespace: audit
labels:
k8s-app: filebeat
spec:
selector:
matchLabels:
app: filebeat
k8s-app: filebeat
template:
metadata:
name: filebeat
labels:
app: filebeat
k8s-app: filebeat
spec:
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
nodeSelector:
node-role.kubernetes.io/master-select: master
containers:
- image: docker.elastic.co/beats/filebeat:6.4.0
name: filebeat
args: [
"-c", "/home/filebeat-config/filebeat.yml",
"-e",
]
securityContext:
runAsUser: 0
volumeMounts:
- name: log
mountPath: /var/log/apiserver
- name: "filebeat-volume"
mountPath: "/home/filebeat-config"
volumes:
- name: filebeat-volume
configMap:
name: filebeat-config
- hostPath:
path: /var/log/apiserver
type: DirectoryOrCreate
name: log
master 节点打标签,部署
kubectl label node masternamexxx node-role.kubernetes.io/master-select=master
kubectl create ns audit
kubectl apply -f filebeat-configmap.yaml
kubectl apply -f filebeat-ds.yaml
标签:audit,filebeat,log,开启,system,日志,K8s,resources,name
From: https://www.cnblogs.com/david-cloud/p/18291792