Skip to content

Instantly share code, notes, and snippets.

@Smana
Last active March 9, 2019 08:04
Show Gist options
  • Save Smana/03020a19ab055238aaa907a25457ce8c to your computer and use it in GitHub Desktop.
Save Smana/03020a19ab055238aaa907a25457ce8c to your computer and use it in GitHub Desktop.
servicerole-serviceaccount-nats
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "452f37bb-1055-43a2-8931-18d97b1fa4b4",
"stage": "RequestReceived",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "get",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"requestReceivedTimestamp": "2019-03-09T07:55:26.396990Z",
"stageTimestamp": "2019-03-09T07:55:26.396990Z"
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "452f37bb-1055-43a2-8931-18d97b1fa4b4",
"stage": "ResponseComplete",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "get",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"responseStatus": {
"metadata": {},
"status": "Failure",
"reason": "NotFound",
"code": 404
},
"requestReceivedTimestamp": "2019-03-09T07:55:26.396990Z",
"stageTimestamp": "2019-03-09T07:55:26.398804Z",
"annotations": {
"authorization.k8s.io/decision": "allow",
"authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"nats-operator-binding\" of ClusterRole \"nats-operator\" to ServiceAccount \"nats-operator/default\""
}
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "36a2a26f-8f4a-4d69-9bfa-f6604c737d69",
"stage": "ResponseComplete",
"requestURI": "/api/v1/namespaces/default/secrets",
"verb": "create",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"responseStatus": {
"metadata": {},
"code": 201
},
"requestReceivedTimestamp": "2019-03-09T07:55:26.400228Z",
"stageTimestamp": "2019-03-09T07:55:26.405909Z",
"annotations": {
"authorization.k8s.io/decision": "allow",
"authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"nats-operator-binding\" of ClusterRole \"nats-operator\" to ServiceAccount \"nats-operator/default\""
}
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "b18b5813-3b61-44bf-8837-011e6b30cd12",
"stage": "RequestReceived",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "update",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"requestReceivedTimestamp": "2019-03-09T07:55:26.418565Z",
"stageTimestamp": "2019-03-09T07:55:26.418565Z"
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "b18b5813-3b61-44bf-8837-011e6b30cd12",
"stage": "ResponseComplete",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "update",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"uid": "b33d9401-4240-11e9-8b37-549f351ac4f0",
"apiVersion": "v1",
"resourceVersion": "18869732"
},
"responseStatus": {
"metadata": {},
"code": 200
},
"requestReceivedTimestamp": "2019-03-09T07:55:26.418565Z",
"stageTimestamp": "2019-03-09T07:55:26.421695Z",
"annotations": {
"authorization.k8s.io/decision": "allow",
"authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"nats-operator-binding\" of ClusterRole \"nats-operator\" to ServiceAccount \"nats-operator/default\""
}
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "e39de2de-a5a3-47d0-a3fe-a9478fcd0558",
"stage": "RequestReceived",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "get",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"requestReceivedTimestamp": "2019-03-09T07:55:26.583923Z",
"stageTimestamp": "2019-03-09T07:55:26.583923Z"
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "e39de2de-a5a3-47d0-a3fe-a9478fcd0558",
"stage": "ResponseComplete",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "get",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"responseStatus": {
"metadata": {},
"code": 200
},
"requestReceivedTimestamp": "2019-03-09T07:55:26.583923Z",
"stageTimestamp": "2019-03-09T07:55:26.586248Z",
"annotations": {
"authorization.k8s.io/decision": "allow",
"authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"nats-operator-binding\" of ClusterRole \"nats-operator\" to ServiceAccount \"nats-operator/default\""
}
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "55fe2c0f-0865-4317-9ec1-e2cccea277e0",
"stage": "RequestReceived",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "get",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"requestReceivedTimestamp": "2019-03-09T07:55:29.183785Z",
"stageTimestamp": "2019-03-09T07:55:29.183785Z"
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "55fe2c0f-0865-4317-9ec1-e2cccea277e0",
"stage": "ResponseComplete",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "get",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"responseStatus": {
"metadata": {},
"code": 200
},
"requestReceivedTimestamp": "2019-03-09T07:55:29.183785Z",
"stageTimestamp": "2019-03-09T07:55:29.186291Z",
"annotations": {
"authorization.k8s.io/decision": "allow",
"authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"nats-operator-binding\" of ClusterRole \"nats-operator\" to ServiceAccount \"nats-operator/default\""
}
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "5269100d-bc4f-4ba9-a943-70c985d4565d",
"stage": "RequestReceived",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "get",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"requestReceivedTimestamp": "2019-03-09T07:55:31.183734Z",
"stageTimestamp": "2019-03-09T07:55:31.183734Z"
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "5269100d-bc4f-4ba9-a943-70c985d4565d",
"stage": "ResponseComplete",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "get",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"responseStatus": {
"metadata": {},
"code": 200
},
"requestReceivedTimestamp": "2019-03-09T07:55:31.183734Z",
"stageTimestamp": "2019-03-09T07:55:31.186025Z",
"annotations": {
"authorization.k8s.io/decision": "allow",
"authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"nats-operator-binding\" of ClusterRole \"nats-operator\" to ServiceAccount \"nats-operator/default\""
}
}
{
"kind": "Event",
"apiVersion": "audit.k8s.io/v1",
"level": "Metadata",
"auditID": "7cbb4996-8fb6-4875-a0c7-fcbb26d31752",
"stage": "ResponseComplete",
"requestURI": "/api/v1/namespaces/default/secrets/nats-user-nats-cluster-bound-token",
"verb": "delete",
"user": {
"username": "system:serviceaccount:default:nats-operator",
"uid": "7ab8baff-41b9-11e9-8b37-549f351ac4f0",
"groups": [
"system:serviceaccounts",
"system:serviceaccounts:default",
"system:authenticated"
]
},
"sourceIPs": [
"10.174.218.129"
],
"userAgent": "nats-operator/v0.0.0 (linux/amd64) kubernetes/$Format",
"objectRef": {
"resource": "secrets",
"namespace": "default",
"name": "nats-user-nats-cluster-bound-token",
"apiVersion": "v1"
},
"responseStatus": {
"metadata": {},
"status": "Success",
"code": 200
},
"requestReceivedTimestamp": "2019-03-09T07: 57: 53.064597Z",
"stageTimestamp": "2019-03-09T07: 57: 53.071446Z",
"annotations": {
"authorization.k8s.io/decision": "allow",
"authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"nats-operator-binding\" of ClusterRole \"nats-operator\" to ServiceAccount \"nats-operator/default\""
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment