Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ingest Audit Logs #3356

Open
2 of 3 tasks
Rotfuks opened this issue Mar 27, 2024 · 1 comment
Open
2 of 3 tasks

Ingest Audit Logs #3356

Rotfuks opened this issue Mar 27, 2024 · 1 comment
Labels
team/atlas Team Atlas

Comments

@Rotfuks
Copy link
Contributor

Rotfuks commented Mar 27, 2024

Motivation

As we manage the infrastructure for our customers those systems are highly sensitive. In order to guarantee their safety we have to provide information about who is how and why accessing those systems. This can be done through audit logs. Therefore we need to provide audit logs to our customers.

Stories

  1. 0 of 3
    kind/story team/atlas

Outcome

  • We have Audit Logs for our systems ingested and can provide the audit information to our customers through the typical channels.
@github-project-automation github-project-automation bot moved this to Inbox 📥 in Roadmap Mar 27, 2024
@Rotfuks Rotfuks added the team/atlas Team Atlas label Mar 27, 2024
@Rotfuks Rotfuks changed the title Importing of Audit Logs Ingest of Audit Logs Mar 27, 2024
@Rotfuks Rotfuks changed the title Ingest of Audit Logs Ingest Audit Logs Mar 27, 2024
@TheoBrigitte TheoBrigitte self-assigned this Oct 10, 2024
@TheoBrigitte
Copy link
Member

Regarding Teleport audit events, there is a way to export events from our Teleport cloud and ship then into Fluentd (or probably any other JSON compatible log ingester ... Alloy 👀), but exported events are from all installations and I haven't found a way to filter events from the teleport side.

I did follow the Export Events with Fluentd guide, and used the identity file from kg get secret abc-identity-output -oyaml|yq -r .data.identity|base64 -d> identity.
We use Teleport cloud, meaning our Auth service is hosted at teleport.giantswarm.io, so events are produced at the cloud level. The teleport-event-handler would then connect to the Auth service and retrieve the events it contains.

Useful links:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
team/atlas Team Atlas
Projects
Status: Inbox 📥
Development

No branches or pull requests

2 participants