
Summary
This rule is designed to monitor access to sensitive Kubernetes objects such as configmaps and secrets within Google Cloud Platform (GCP). Using Splunk's search capabilities, the rule analyzes logs from the GCP Pub/Sub messaging service to identify accounts that may be accessing these sensitive resources. By examining the `protoPayload` of Pub/Sub messages, it filters for authorization information related to the access of Kubernetes resources. The query extracts relevant details, such as the caller IP address, source user, and namespace associated with the access requests, while deduplicating results to focus on unique combinations of users and resources accessed. The implementation requires the installation of the Splunk add-on for GCP, enabling the use of Pub/Sub messaging logs for effective monitoring and detection of potentially unauthorized access to sensitive Kubernetes objects. The rule is marked as deprecated, reflecting that a more effective or updated method may now be recommended for similar monitoring tasks.
Categories
- Kubernetes
- Cloud
- GCP
Data Sources
- Cloud Service
- Process
Created: 2024-11-14