From the course: Kubernetes Threat and Attack Detection by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Learning objectives - Kubernetes Tutorial
From the course: Kubernetes Threat and Attack Detection by Pearson
Learning objectives
“
In Lesson 2, Using Kubernetes Audit Logs to Monitor Access, we'll explore the role of auditing in Kubernetes and how audit logs can provide much more enhanced security oversight of your environment. You'll learn to be able to define and configure an audit policy, as well as to be able to understand event batching and tuning for efficient log management. We'll then explore back-end log storage options as well, so that you can see how to make this scale.