Auditing IM service
IM uses Rsyslog sidecar to send the IM related audit records to the Audit logging service of the foundational services, over TLS syslog connections.
By default, the Audit logs are disabled in IM. You can enable the auditing in IM by using the following methods:
oc
command- console
Using the oc command
To enable the auditing in the IM by using the oc
command, complete the following steps:
Pre-requisite: Install and configure the IBM Cloud Pak foundational services Audit logging service. For more information, see Configuring CommonAudit.
-
Edit the
platform-auth-idp
configmap in the<foundational-services>
namespace:oc -n <your-foundational-services-namespace> edit configmap platform-auth-idp
-
Set the following attribute values to
true
:- AUDIT_ENABLED_IDPROVIDER: 'true'
- AUDIT_ENABLED_IDMGMT: 'true'
-
Save the configmap.
-
Delete the auth-idp pods.
oc -n <your-foundational-services-namespace> delete pods <pod_name>
-
To check whether the audit logs are generated, get into the
icp-audit-service
container of theauth-idp
pod and check if the/var/log/audit/
log files are generated or not.oc exec -it <auth-idp-pod-name> -c icp-audit-service – bash
Once you complete these steps, the audit logs are forwarded to the appropriate SIEM tool that are configured within the <foundational-services>
namespace .
Using the console
Pre-requisite: Install and configure the IBM Cloud Pak foundational services Audit logging service. For more information, see Configuring CommonAudit.
- Log in to the OpenShift Container Platform console.
- From the navigation menu, click Workloads > Config Maps.
- Search for
platform-auth-idp
. - Click ... > Edit Config Map.
-
Set the following attribute values to
true
:- AUDIT_ENABLED_IDPROVIDER: 'true'
- AUDIT_ENABLED_IDMGMT: 'true'
Note: A warning message,
resource is managed by example-authentication and any modifications may be overwritten
, is displayed. You can ignore this message. -
Click Save.
-
From the navigation menu, click Workloads > Deployments.
-
Locate
auth-idp
. -
Click ... > Edit Deployment. A window for editing displays.
-
Click Save without making any change. This step is to reload the
auth-idp
pods with the latest ConfigMap values. -
Click
auth-idp
. -
Wait for some time. Then, check the status of the
auth-idp
pods in the Pods pane. The status of the pods must show as4/4
under the Ready field name. -
To check whether the audit logs are generated, get into the
icp-audit-service
container of theauth-idp
pod and check if the/var/log/audit/
log files are generated or not.