UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

All audit records must identify any containers associated with the event within Rancher RKE2.


Overview

Finding ID Version Rule ID IA Controls Severity
V-254563 CNTR-R2-000320 SV-254563r918257_rule Medium
Description
Ensure that the --audit-log-maxage argument is set to 30 or as appropriate. Retaining logs for at least 30 days ensures that you can go back in time and investigate or correlate any events. Set your audit log retention period to 30 days or as per your business requirements. Result: Pass
STIG Date
Rancher Government Solutions RKE2 Security Technical Implementation Guide 2023-06-05

Details

Check Text ( C-58047r859257_chk )
Ensure audit-log-maxage is set correctly.

Run the below command on the RKE2 Control Plane:
/bin/ps -ef | grep kube-apiserver | grep -v grep

If --audit-log-maxage argument is not set to at least 30 or is not configured, this is a finding.
(By default, RKE2 sets the --audit-log-maxage argument parameter to 30.)
Fix Text (F-57996r918237_fix)
Edit the RKE2 Configuration File /etc/rancher/rke2/config.yaml on the RKE2 Control Plane and set the following "kube-apiserver-arg" argument:

- audit-log-maxage=30

Once the configuration file is updated, restart the RKE2 Server. Run the command:
systemctl restart rke2-server