Skip to content

Commit b3bf7b2

Browse files
authored
Merge pull request #81054 from apurvanisal5/patch-1
Update logging-audit-log-filtering.adoc
2 parents 36db801 + 83cae47 commit b3bf7b2

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

modules/logging-audit-log-filtering.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,12 @@ OpenShift API servers generate audit events for each API call, detailing the req
1212
* `Request`: Audit metadata and the request body are included, the response body is removed.
1313
* `RequestResponse`: All data is included: metadata, request body and response body. The response body can be very large. For example, `oc get pods -A` generates a response body containing the YAML description of every pod in the cluster.
1414
15+
16+
[NOTE]
17+
====
18+
You can use this feature only if the Vector collector is set up in your logging deployment.
19+
====
20+
1521
In logging 5.8 and later, the `ClusterLogForwarder` custom resource (CR) uses the same format as the standard link:https://kubernetes.io/docs/tasks/debug/debug-cluster/audit/#audit-policy[Kubernetes audit policy], while providing the following additional functions:
1622

1723
Wildcards:: Names of users, groups, namespaces, and resources can have a leading or trailing `\*` asterisk character. For example, namespace `openshift-\*` matches `openshift-apiserver` or `openshift-authentication`. Resource `\*/status` matches `Pod/status` or `Deployment/status`.

0 commit comments

Comments
 (0)