You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: Removed support for "WriteRequestBodies" from the audit_log_policy input. Allowed values are now "default" and "verbose". This is because patching the Kube Audit Profile in APIServer Custom Resource is not possible in version 4.18 and onwards because a newly introduced validatingadmissionpolicy named config prevents it. Audit logs are enabled in the backend and completely managed by IBM Cloud. (#954)
Copy file name to clipboardExpand all lines: examples/add_rules_to_sg/main.tf
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -158,7 +158,7 @@ locals {
158
158
pool_name ="default"# ibm_container_vpc_cluster automatically names standard pool "standard" (See https://github.com/IBM-Cloud/terraform-provider-ibm/issues/2849)
Copy file name to clipboardExpand all lines: examples/advanced/main.tf
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ locals {
113
113
pool_name ="default"# ibm_container_vpc_cluster automatically names default pool "default" (See https://github.com/IBM-Cloud/terraform-provider-ibm/issues/2849)
Copy file name to clipboardExpand all lines: examples/cross_kms_support/main.tf
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ locals {
68
68
pool_name ="default"# ibm_container_vpc_cluster automatically names default pool "default" (See https://github.com/IBM-Cloud/terraform-provider-ibm/issues/2849)
69
69
machine_type ="bx2.4x16"
70
70
workers_per_zone =2# minimum of 2 is allowed when using single zone
| <aname="input_audit_deployment_name"></a> [audit\_deployment\_name](#input\_audit\_deployment\_name)| The name of log collection deployment and service. |`string`|`"ibmcloud-kube-audit"`| no |
86
-
| <aname="input_audit_log_policy"></a> [audit\_log\_policy](#input\_audit\_log\_policy)| Specify the amount of information that is logged to the API server audit logs by choosing the audit log policy profile to use. Supported values are `default` and `WriteRequestBodies`. |`string`|`"default"`| no |
85
+
| <aname="input_audit_log_policy"></a> [audit\_log\_policy](#input\_audit\_log\_policy)| Specify the amount of information that is logged to the API server audit logs by choosing the audit log policy profile to use. Supported values are `default` and `verbose`. |`string`|`"default"`| no |
87
86
| <aname="input_audit_namespace"></a> [audit\_namespace](#input\_audit\_namespace)| The name of the namespace where log collection service and a deployment will be created. |`string`|`"ibm-kube-audit"`| no |
88
87
| <aname="input_audit_webhook_listener_image"></a> [audit\_webhook\_listener\_image](#input\_audit\_webhook\_listener\_image)| The audit webhook listener image reference in the format of `[registry-url]/[namespace]/[image]`.The sub-module uses the `icr.io/ibm/ibmcloud-kube-audit-to-ibm-cloud-logs` image to forward logs to IBM Cloud Logs. This image is for demonstration purposes only. For a production solution, configure and maintain your own log forwarding image. |`string`|`"icr.io/ibm/ibmcloud-kube-audit-to-ibm-cloud-logs"`| no |
89
88
| <aname="input_audit_webhook_listener_image_tag_digest"></a> [audit\_webhook\_listener\_image\_tag\_digest](#input\_audit\_webhook\_listener\_image\_tag\_digest)| The tag or digest for the audit webhook listener image to deploy. If changing the value, ensure it is compatible with `audit_webhook_listener_image`. |`string`|`"8309d2a56ef85a5c486f195178d68c616a5123b3@sha256:a484d3dfeeb8f021fd51ca54fcc8a6618e0d49eecd1ca8c520d73d51cbfbfdb4"`| no |
Copy file name to clipboardExpand all lines: modules/kube-audit/main.tf
+2-16Lines changed: 2 additions & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -38,20 +38,6 @@ locals {
38
38
validate_existing_vpc_id=tonumber(regex("^([0-9]+\\.[0-9]+)", data.ibm_container_vpc_cluster.cluster.kube_version)[0]) >"4.14"?true:tobool("Kubernetes API server audit logs forwarding is only supported in ocp versions 4.15 and later.")
description="Specify the amount of information that is logged to the API server audit logs by choosing the audit log policy profile to use. Supported values are `default` and `WriteRequestBodies`."
67
+
description="Specify the amount of information that is logged to the API server audit logs by choosing the audit log policy profile to use. Supported values are `default` and `verbose`."
68
68
default="default"
69
69
70
70
validation {
71
-
error_message="Invalid Audit log policy Type! Valid values are 'default' or 'WriteRequestBodies'"
0 commit comments