heroui logo

Kubernetes Azure pod scan fingerprint

Splunk Security Content

View Source
Summary
This detection rule is designed to identify unauthenticated access attempts to Kubernetes pods deployed in Azure Kubernetes Service (AKS). By leveraging Kubernetes audit logs, this rule filters for specific HTTP response statuses, particularly looking for 401 Unauthorized responses. The search involves extracting critical attributes from the log such as source IP addresses, user agents, request URIs, and the reasons for the response status. This can help administrators determine if there are potential unauthorized scanning activities against their Kubernetes pods.
Categories
  • Kubernetes
  • Cloud
  • Azure
Data Sources
  • Kernel
  • Container
  • Network Traffic
Created: 2024-11-14