- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 156 for auditing (0.22 sec)
-
staging/src/k8s.io/apiserver/pkg/audit/context.go
return ev } // WithAuditID sets the AuditID on the AuditContext. The AuditContext must already be present in the // request context. If the specified auditID is empty, no value is set. func WithAuditID(ctx context.Context, auditID types.UID) { if auditID == "" { return } if ac := AuditContextFrom(ctx); ac != nil { ac.Event.AuditID = auditID } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jul 03 16:16:51 UTC 2023 - 6.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/apis/audit/v1/types.go
HeaderAuditID = "Audit-ID" ) // Level defines the amount of information logged during auditing type Level string // Valid audit levels const ( // LevelNone disables auditing LevelNone Level = "None" // LevelMetadata provides the basic level of auditing. LevelMetadata Level = "Metadata" // LevelRequest provides Metadata level of auditing, and additionally // logs the request object (does not apply for non-resource requests).
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 27 20:24:10 UTC 2023 - 14.5K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/apis/audit/types.go
HeaderAuditID = "Audit-ID" ) // Level defines the amount of information logged during auditing type Level string // Valid audit levels const ( // LevelNone disables auditing LevelNone Level = "None" // LevelMetadata provides the basic level of auditing. LevelMetadata Level = "Metadata" // LevelRequest provides Metadata level of auditing, and additionally // logs the request object (does not apply for non-resource requests).
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Oct 03 09:18:23 UTC 2023 - 11.8K bytes - Viewed (0) -
build-logic/root-build/src/main/kotlin/gradlebuild.root-build.gradle.kts
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Wed Apr 05 12:37:04 UTC 2023 - 979 bytes - Viewed (0) -
internal/http/response-recorder.go
} return hj.Hijack() } // NewResponseRecorder - returns a wrapped response writer to trap // http status codes for auditing purposes. func NewResponseRecorder(w http.ResponseWriter) *ResponseRecorder { rf, _ := w.(io.ReaderFrom) return &ResponseRecorder{ ResponseWriter: w, ReaderFrom: rf, StatusCode: http.StatusOK,
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Sat Dec 02 00:13:19 UTC 2023 - 4.9K bytes - Viewed (0) -
staging/src/k8s.io/api/admission/v1/types_swagger_doc_generated.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 22 00:51:25 UTC 2023 - 7.5K bytes - Viewed (0) -
staging/src/k8s.io/api/admission/v1/generated.proto
// The UID is meant to track the round trip (request/response) between the KAS and the WebHook, not the user request. // It is suitable for correlating log entries between the webhook and apiserver, for either auditing or debugging. optional string uid = 1; // Kind is the fully-qualified type of object being submitted (for example, v1.Pod or autoscaling.v1.Scale) optional .k8s.io.apimachinery.pkg.apis.meta.v1.GroupVersionKind kind = 2;
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 8.1K bytes - Viewed (0) -
staging/src/k8s.io/api/admission/v1beta1/generated.proto
// The UID is meant to track the round trip (request/response) between the KAS and the WebHook, not the user request. // It is suitable for correlating log entries between the webhook and apiserver, for either auditing or debugging. optional string uid = 1; // Kind is the fully-qualified type of object being submitted (for example, v1.Pod or autoscaling.v1.Scale) optional .k8s.io.apimachinery.pkg.apis.meta.v1.GroupVersionKind kind = 2;
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Mar 28 15:34:11 UTC 2024 - 8.1K bytes - Viewed (0) -
staging/src/k8s.io/api/admission/v1beta1/types_swagger_doc_generated.go
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Jan 22 00:51:25 UTC 2023 - 7.5K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/endpoints/filters/audit.go
func evaluatePolicyAndCreateAuditEvent(req *http.Request, policy audit.PolicyRuleEvaluator) (*audit.AuditContext, error) { ctx := req.Context() ac := audit.AuditContextFrom(ctx) if ac == nil { // Auditing not configured. return nil, nil } attribs, err := GetAuthorizerAttributes(ctx) if err != nil { return ac, fmt.Errorf("failed to GetAuthorizerAttributes: %v", err) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jul 03 16:16:51 UTC 2023 - 8.6K bytes - Viewed (0)