AKS Kubernetes Audit Logs

Cloud & SaaSCloud InfrastructureCloud Control PlaneSIEM / Log Aggregator

Location

Azure Monitor diagnostic settings for AKS (categories: kube-audit, kube-audit-admin)

Description

Kubernetes API server audit records for AKS capturing authenticated requests against cluster resources, including pods, secrets, configmaps, role bindings, service accounts, exec sessions, and admission decisions.

Forensic Value

Kubernetes audit logs are the primary source for reconstructing attacker actions inside the cluster control plane. They reveal pod exec abuse, secret reads, privileged workload creation, cluster role binding changes, token misuse, and direct API access to sensitive resources. When retained in Log Analytics or Sentinel they provide the only reliable record of many in-cluster administrative actions.

Tools Required

Azure MonitorLog AnalyticsKQLkubectl

Collection Commands

KQL

AKSAudit | where TimeGenerated > ago(30d) | project TimeGenerated, Verb, UserAgent, UserUsername, SourceIps, RequestURI, ObjectRefResource, ResponseStatusCode

KQL

AKSAuditAdmin | where TimeGenerated > ago(30d) | where Verb in ("create", "patch", "delete", "update") | project TimeGenerated, UserUsername, Verb, RequestURI, ResponseStatusCode

kubectl

kubectl get events --all-namespaces --sort-by=.metadata.creationTimestamp

MITRE ATT&CK Techniques

T1552T1611T1525T1550.001

Related Blockers