You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As we manage the infrastructure for our customers those systems are highly sensitive. In order to guarantee their safety we have to provide information about who is how and why accessing those systems. This can be done through audit logs. Therefore we need to provide audit logs to our customers.
The content you are editing has changed. Please copy your edits and refresh the page.
Regarding Teleport audit events, there is a way to export events from our Teleport cloud and ship then into Fluentd (or probably any other JSON compatible log ingester ... Alloy 👀), but exported events are from all installations and I haven't found a way to filter events from the teleport side.
I did follow the Export Events with Fluentd guide, and used the identity file from kg get secret abc-identity-output -oyaml|yq -r .data.identity|base64 -d> identity.
We use Teleport cloud, meaning our Auth service is hosted at teleport.giantswarm.io, so events are produced at the cloud level. The teleport-event-handler would then connect to the Auth service and retrieve the events it contains.
Motivation
As we manage the infrastructure for our customers those systems are highly sensitive. In order to guarantee their safety we have to provide information about who is how and why accessing those systems. This can be done through audit logs. Therefore we need to provide audit logs to our customers.
Stories
Outcome
The text was updated successfully, but these errors were encountered: