Analyse des logs d'audit
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Request",
"auditID": "8a4c5c7e-7b9f-4c8d-9e6f-1a2b3c4d5e6f",
"stage": "ResponseStarted",
"requestURI": "/api/v1/namespaces/default/secrets",
"verb": "create",
"user": {
"username": "alice@company.com",
"groups": ["developers"]
},
"sourceIPs": ["10.0.0.5"],
"userAgent": "kubectl/v1.33.0",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "app-secret"
},
"requestReceivedTimestamp": "2024-03-15T10:30:45.123456Z"
}
Analyse avec des outils :
- jq :
cat audit.log | jq '.user.username' | sort | uniq -c
- Falco : détection de patterns suspects
- ELK Stack : indexation et dashboards
- Grafana + Loki : visualisation moderne