π AWS EKS Cluster Logging is not enabled for all control plane logs types π’
- Contextual name: π Cluster Logging is not enabled for all control plane logs types π’
- ID:
/ce/ca/aws/eks/cluster-logging
- Located in: π AWS EKS
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
RELIABILITY
Similar Policiesβ
- Internal
dec-x-8ccccedc
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-8ccccedc | 1 |
Logicβ
- π§ prod.logic.yaml π’
- π AWS EKS Cluster
- π AWS EKS Cluster - object.extracts.yaml
- π§ͺ test-data.json
Descriptionβ
Descriptionβ
EKS control plane logging enables the delivery of audit and diagnostic logs directly from the EKS control plane to Amazon CloudWatch Logs within your account. The following log types are available:
- API Server - Includes logs that capture API server flags used during the serverβs startup.
- Audit - Kubernetes audit logs capturing actions performed by users, administrators, or system components that affect your cluster.
- Authenticator - Specific to Amazon EKS, these logs capture the control planeβs authentication activity using IAM credentials for Kubernetes RBAC.
- Controller Manager - Logs from the component responsible for running core control loops that regulate cluster state.
- Scheduler - Captures events from the scheduler, which determines placement and scheduling of Pods within the cluster.
Rationalβ
Enabling EKS control plane logging is essential for security auditing, regulatory compliance, and operational diagnostics. These logs offer visibility into key events and system behavior, allowing you to detect unauthorized access, trace configuration changes, identify performance issues, and respond to incidents. Without them, understanding who made changes, when they occurred, and their impact becomes significantly more challenging, resulting in critical blind spots.
... see more
Remediationβ
Remediationβ
From Command Lineβ
To enable control plane logging for your Amazon EKS cluster, update the logging configuration with the following command:
aws eks update-cluster-config \
--region {{region-code}} \
--name {{cluster-name}} \
--logging '{"clusterLogging":[{"types":["api","audit","authenticator","controllerManager","scheduler"],"enabled":true}]}'