This documentation is for a release that is no longer maintained
See documentation for the latest supported version 3 or the latest supported version 4.Chapter 8. Configuring the audit log policy
You can control the amount of information that is logged to the API server audit logs by choosing the audit log policy profile to use.
8.1. About audit log policy profiles
Audit log profiles define how to log requests that come to the OpenShift API server, the Kubernetes API server, and the OAuth API server.
OpenShift Container Platform provides the following predefined audit policy profiles:
| Profile | Description | 
|---|---|
| 
								 | Logs only metadata for read and write requests; does not log request bodies except for OAuth access token creation (login) requests. This is the default policy. | 
| 
								 | 
								In addition to logging metadata for all requests, logs request bodies for every write request to the API servers ( | 
| 
								 | 
								In addition to logging metadata for all requests, logs request bodies for every read and write request to the API servers ( | 
- 
						Sensitive resources, such as Secret,Route, andOAuthClientobjects, are never logged past the metadata level. OAuth tokens are not logged at all if your cluster was upgraded from OpenShift Container Platform 4.5, because their object names might contain secret information.
				By default, OpenShift Container Platform uses the Default audit log profile. You can use another audit policy profile that also logs request bodies, but be aware of the increased resource usage (CPU, memory, and I/O).
			
8.2. Configuring the audit log policy
You can configure the audit log policy to use when logging requests that come to the API servers.
Prerequisites
- 
						You have access to the cluster as a user with the cluster-adminrole.
Procedure
- Edit the - APIServerresource:- oc edit apiserver cluster - $ oc edit apiserver cluster- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Update the - spec.audit.profilefield:- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Set toDefault,WriteRequestBodies, orAllRequestBodies. The default profile isDefault.
 
- Save the file to apply the changes.
- Verify that a new revision of the Kubernetes API server pods has rolled out. This will take several minutes. - oc get kubeapiserver -o=jsonpath='{range .items[0].status.conditions[?(@.type=="NodeInstallerProgressing")]}{.reason}{"\n"}{.message}{"\n"}'- $ oc get kubeapiserver -o=jsonpath='{range .items[0].status.conditions[?(@.type=="NodeInstallerProgressing")]}{.reason}{"\n"}{.message}{"\n"}'- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Review the - NodeInstallerProgressingstatus condition for the Kubernetes API server to verify that all nodes are at the latest revision. The output shows- AllNodesAtLatestRevisionupon successful update:- AllNodesAtLatestRevision 3 nodes are at revision 12 - AllNodesAtLatestRevision 3 nodes are at revision 12- 1 - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- In this example, the latest revision number is12.
 - If the output shows a message similar to one of the following, this means that the update is still in progress. Wait a few minutes and try again. - 
								3 nodes are at revision 11; 0 nodes have achieved new revision 12
- 
								2 nodes are at revision 11; 1 nodes are at revision 12