Skip to main content

Kubernetes Activity

Lacework generates Kubernetes-activity-based alerts when there are Kubernetes-activity-related vulnerabilities detected. You can define alert rules to trigger alerts when Kubernetes-activity-related vulnerabilities are found. See Alert Rules.

Alert List

The following table lists all the Kubernetes-activity-based alerts.

Alert NameAlert TypeEvent ModelAlert Subcategory
K8s audit log cluster role createdNewK8sAuditLogClusterRoleK8sAuditLogKubernetes Activity
K8s audit log cluster role binding createdNewK8sAuditLogClusterRoleBindingK8sAuditLogKubernetes Activity
K8s audit log cluster role bindings to adminNewK8sAuditLogClusterRoleBindingsToAdminK8sAuditLogKubernetes Activity
K8s audit log cluster role bindings to cluster adminNewK8sAuditLogClusterRoleBindingsToClusterAdminK8sAuditLogKubernetes Activity
K8s audit log cluster role bindings to editNewK8sAuditLogClusterRoleBindingsToEditK8sAuditLogKubernetes Activity
K8s audit log cluster role bindings to systemNewK8sAuditLogClusterRoleBindingsToSystemK8sAuditLogKubernetes Activity
K8s audit log cluster role with all resourcesNewK8sAuditLogClusterRoleWithAllResourcesK8sAuditLogKubernetes Activity
K8s audit log cluster role with pod execNewK8sAuditLogClusterRoleWithPodExecK8sAuditLogKubernetes Activity
K8s audit log cluster role with pods writeNewK8sAuditLogClusterRoleWithPodsWriteK8sAuditLogKubernetes Activity
K8s audit log cluster role with secretsNewK8sAuditLogClusterRoleWithSecretsK8sAuditLogKubernetes Activity
K8s audit log ingress createdNewK8sAuditLogIngressK8sAuditLogKubernetes Activity
K8s audit log namespace createdNewK8sAuditLogNamespaceK8sAuditLogKubernetes Activity
K8s audit log resource createdNewK8sAuditLogResourceK8sAuditLogKubernetes Activity
K8s audit log role createdNewK8sAuditLogRoleK8sAuditLogKubernetes Activity
K8s audit log role binding createdNewK8sAuditLogRoleBindingK8sAuditLogKubernetes Activity
K8s audit log role bindings to adminNewK8sAuditLogRoleBindingsToAdminK8sAuditLogKubernetes Activity
K8s audit log role bindings to cluster adminNewK8sAuditLogRoleBindingsToClusterAdminK8sAuditLogKubernetes Activity
K8s audit log role bindings to editNewK8sAuditLogRoleBindingsToEditK8sAuditLogKubernetes Activity
K8s audit log role bindings to systemNewK8sAuditLogRoleBindingsToSystemK8sAuditLogKubernetes Activity
K8s audit log role with all resourcesNewK8sAuditLogRoleWithAllResourcesK8sAuditLogKubernetes Activity
K8s audit log role with pod execNewK8sAuditLogRoleWithPodExecK8sAuditLogKubernetes Activity
K8s audit log role with pods writeNewK8sAuditLogRoleWithPodsWriteK8sAuditLogKubernetes Activity
K8s audit log role with secretsNewK8sAuditLogRoleWithSecretsK8sAuditLogKubernetes Activity
K8s audit log workload createdNewK8sAuditLogWorkloadK8sAuditLogKubernetes Activity
New K8s workload created with privilege escalationNewK8sAuditLogWorkloadAllowsEscalationK8sAuditLogKubernetes Activity
New K8s workload created with host accessNewK8sAuditLogWorkloadWithHostAccessK8sAuditLogKubernetes Activity

Suppress an Alert

Suppressing specific Kubernetes-activity alerts reduces the number of alerts and allows you to focus on the assets that are most important to you. For details, see Suppress Behavior Anomaly Alerts.