Google Kubernetes Engine Audit Logs

Cloud & SaaSCloud InfrastructureGoogle CloudGoogle Kubernetes EngineKubernetesCloud Control PlaneSIEM / Log Aggregator

Location

Cloud Logging > GKE cluster audit streams and Kubernetes API audit entries

Description

Kubernetes API audit records for Google Kubernetes Engine clusters, capturing authenticated resource requests, secret access, RBAC changes, pod exec activity, and high-value control-plane actions.

Forensic Value

GKE audit logs are the highest-fidelity source for reconstructing attacker actions in the cluster control plane. They reveal secret access, privilege escalation, abuse of service accounts, and direct API activity that may never be visible in node or application logs.

Tools Required

Google Cloud Consolegcloud CLIkubectlSIEM

Collection Commands

gcloud CLI

gcloud logging read "resource.type="k8s_cluster" AND logName:("cloudaudit.googleapis.com%2Factivity" OR "cloudaudit.googleapis.com%2Fdata_access") AND timestamp>="2026-03-01T00:00:00Z"" --format=json > gke_audit_logs.json

kubectl

kubectl get events -A --sort-by=.metadata.creationTimestamp > gke_cluster_events.txt

Collection Constraints

  • Audit fidelity depends on the cluster logging configuration and how logs were routed and retained in Cloud Logging or downstream sinks.
  • Control-plane logs and Kubernetes events should be exported quickly because cluster state can change rapidly after containment begins.

MITRE ATT&CK Techniques

T1552T1525T1611

Related Blockers