Azure Kubernetes Service Security Deep Dive – Part 3 (Audit Logs)
Any activity to your Kubernetes cluster is handled as API request. So, when you create a new pod, changes container image of your deployment or read information from a configmap or secret, you basically generate requests to the Kubernetes API. We can a… Continue reading Azure Kubernetes Service Security Deep Dive – Part 3 (Audit Logs)
