CNTR-R2-000320 All audit records must identify any containers associated with the event within Rancher RKE2.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Ensure that the --audit-log-maxage argument is set to 30 or as appropriate.

Retaining logs for at least 30 days ensures that you can go back in time and investigate or correlate any events. Set your audit log retention period to 30 days or as per your business requirements.
Result: Pass

Solution

Edit the RKE2 Configuration File /etc/rancher/rke2/config.yaml on the RKE2 Control Plane and set the following "kube-apiserver-arg" argument:

- audit-log-maxage=30

Once the configuration file is updated, restart the RKE2 Server. Run the command:
systemctl restart rke2-server

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RGS_RKE2_V2R2_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001487, Rule-ID|SV-254563r960906_rule, STIG-ID|CNTR-R2-000320, Vuln-ID|V-254563

Plugin: Unix

Control ID: 976c4a6b9dc9fa3986b4a91cb0f92124df7ea2a099856c9184c0ca469e5df22a