From the course: Kubernetes Threat and Attack Detection by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Learning objectives

Learning objectives

In Lesson 2, Using Kubernetes Audit Logs to Monitor Access, we'll explore the role of auditing in Kubernetes and how audit logs can provide much more enhanced security oversight of your environment. You'll learn to be able to define and configure an audit policy, as well as to be able to understand event batching and tuning for efficient log management. We'll then explore back-end log storage options as well, so that you can see how to make this scale.

Contents