This incident type is characterized by the detection of unauthorized access to the Kubernetes API server. This unauthorized access potentially enables attackers to manipulate cluster resources. Such incidents can lead to serious consequences, as unauthorized access allows attackers to make changes to the Kubernetes cluster, which may compromise the security and integrity of the entire system. Therefore, it is crucial to promptly detect and address such incidents to ensure the security and proper functioning of the Kubernetes cluster.
Parameters
Debug
Check the status of the Kubernetes API server
Get a list of all the pods running in the default namespace
Check the logs of the kube-apiserver container to see if there are any suspicious activities
Check the Kubernetes audit logs to see if there were any unauthorized API requests
Check the Kubernetes RBAC configuration to ensure that the correct permissions are in place
Repair
Review access controls for the Kubernetes API server and ensure that only authorized users and applications have access.
Learn more
Related Runbooks
Check out these related runbooks to help you debug and resolve similar issues.