Azure Kubernetes Service (AKS) Activity Logs

Cloud & SaaSCloud InfrastructureCloud Control PlaneSIEM / Log Aggregator

Location

Azure Portal > Monitor > Activity Log filtered to Microsoft.ContainerService/managedClusters

Description

Azure control-plane activity logs for AKS clusters covering cluster creation, upgrade, scale changes, diagnostic-setting updates, role assignments, credential rotations, and managed cluster delete operations with caller identity and source IP.

Forensic Value

AKS activity logs show who changed the cluster control plane and when. They are essential for identifying malicious credential rotations, unauthorized cluster admin grants, node pool changes used to stage attacker workloads, and deletion or logging-tampering actions. Correlating caller identity with Entra ID sign-ins reveals whether cluster changes came from compromised administrators, workload identities, or automation accounts.

Tools Required

Azure PortalAzure CLIPowerShell (Az module)SIEM (Sentinel / Log Analytics)

Collection Commands

az CLI

az monitor activity-log list --resource-group <rg> --offset 30d --query "[?contains(operationName.value, `Microsoft.ContainerService/managedClusters`)]" > aks_activity.json

PowerShell

Get-AzLog -ResourceGroupName <rg> -StartTime (Get-Date).AddDays(-30) | Where-Object { $_.ResourceProviderName.Value -like "Microsoft.ContainerService*" } | Export-Csv aks_activity.csv -NoTypeInformation

KQL

AzureActivity | where TimeGenerated > ago(30d) | where ResourceProvider has "Microsoft.ContainerService" | project TimeGenerated, OperationNameValue, Caller, CallerIpAddress, ResourceGroup, ActivityStatusValue

MITRE ATT&CK Techniques

T1578T1098T1484T1525

Related Blockers