AKS Logging To Azure Monitoring Is Disabled
- Query id: 9b09dee1-f09b-4013-91d2-158fa4695f4b
- Query name: AKS Logging To Azure Monitoring Is Disabled
- Platform: AzureResourceManager
- Severity: Medium
- Category: Observability
- CWE: 778
- URL: Github
Description¶
Azure Kubernetes Service should have logging to Azure Monitoring enabled.
Documentation
Code samples¶
Code samples with security vulnerabilities¶
Positive test num. 1 - bicep file
resource aksCluster1 'Microsoft.ContainerService/managedClusters@2020-02-01' = {
name: 'aksCluster1'
location: resourceGroup().location
properties: {
kubernetesVersion: '1.15.7'
addonProfiles: {
omsagent: {
enabled: false
}
}
dnsPrefix: 'dnsprefix'
agentPoolProfiles: [
{
name: 'agentpool'
count: 2
vmSize: 'Standard_A1'
osType: 'Linux'
storageProfile: 'ManagedDisks'
}
]
linuxProfile: {
adminUsername: 'adminUserName'
ssh: {
publicKeys: [
{
keyData: 'keyData'
}
]
}
}
servicePrincipalProfile: {
clientId: 'servicePrincipalAppId'
secret: 'servicePrincipalAppPassword'
}
networkProfile: {
networkPolicy: 'azure'
}
}
}
Positive test num. 2 - json file
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"addonProfiles": {
"omsagent": {
"enabled": false
}
},
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
]
}
Positive test num. 3 - bicep file
resource aksCluster1 'Microsoft.ContainerService/managedClusters@2020-02-01' = {
name: 'aksCluster1'
location: resourceGroup().location
properties: {
kubernetesVersion: '1.15.7'
dnsPrefix: 'dnsprefix'
agentPoolProfiles: [
{
name: 'agentpool'
count: 2
vmSize: 'Standard_A1'
osType: 'Linux'
storageProfile: 'ManagedDisks'
}
]
linuxProfile: {
adminUsername: 'adminUserName'
ssh: {
publicKeys: [
{
keyData: 'keyData'
}
]
}
}
servicePrincipalProfile: {
clientId: 'servicePrincipalAppId'
secret: 'servicePrincipalAppPassword'
}
networkProfile: {
networkPolicy: 'azure'
}
}
}
Positive test num. 4 - json file
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
]
}
Positive test num. 5 - bicep file
resource aksCluster1 'Microsoft.ContainerService/managedClusters@2020-02-01' = {
name: 'aksCluster1'
location: resourceGroup().location
properties: {
kubernetesVersion: '1.15.7'
addonProfiles: {
omsagent: {
enabled: false
}
}
dnsPrefix: 'dnsprefix'
agentPoolProfiles: [
{
name: 'agentpool'
count: 2
vmSize: 'Standard_A1'
osType: 'Linux'
storageProfile: 'ManagedDisks'
}
]
linuxProfile: {
adminUsername: 'adminUserName'
ssh: {
publicKeys: [
{
keyData: 'keyData'
}
]
}
}
servicePrincipalProfile: {
clientId: 'servicePrincipalAppId'
secret: 'servicePrincipalAppPassword'
}
networkProfile: {
networkPolicy: 'azure'
}
}
}
Positive test num. 6 - json file
{
"properties": {
"template": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"addonProfiles": {
"omsagent": {
"enabled": false
}
},
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
],
"outputs": {}
},
"parameters": {}
},
"kind": "template",
"type": "Microsoft.Blueprint/blueprints/artifacts",
"name": "myTemplate"
}
Positive test num. 7 - bicep file
resource aksCluster1 'Microsoft.ContainerService/managedClusters@2020-02-01' = {
name: 'aksCluster1'
location: resourceGroup().location
properties: {
kubernetesVersion: '1.15.7'
dnsPrefix: 'dnsprefix'
agentPoolProfiles: [
{
name: 'agentpool'
count: 2
vmSize: 'Standard_A1'
osType: 'Linux'
storageProfile: 'ManagedDisks'
}
]
linuxProfile: {
adminUsername: 'adminUserName'
ssh: {
publicKeys: [
{
keyData: 'keyData'
}
]
}
}
servicePrincipalProfile: {
clientId: 'servicePrincipalAppId'
secret: 'servicePrincipalAppPassword'
}
networkProfile: {
networkPolicy: 'azure'
}
}
}
Positive test num. 8 - json file
{
"properties": {
"template": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
],
"outputs": {}
},
"parameters": {}
},
"kind": "template",
"type": "Microsoft.Blueprint/blueprints/artifacts",
"name": "myTemplate"
}
Code samples without security vulnerabilities¶
Negative test num. 1 - bicep file
resource aksCluster1 'Microsoft.ContainerService/managedClusters@2020-02-01' = {
name: 'aksCluster1'
location: resourceGroup().location
properties: {
kubernetesVersion: '1.15.7'
addonProfiles: {
omsagent: {
enabled: true
}
}
dnsPrefix: 'dnsprefix'
agentPoolProfiles: [
{
name: 'agentpool'
count: 2
vmSize: 'Standard_A1'
osType: 'Linux'
storageProfile: 'ManagedDisks'
}
]
linuxProfile: {
adminUsername: 'adminUserName'
ssh: {
publicKeys: [
{
keyData: 'keyData'
}
]
}
}
servicePrincipalProfile: {
clientId: 'servicePrincipalAppId'
secret: 'servicePrincipalAppPassword'
}
networkProfile: {
networkPolicy: 'azure'
}
}
}
Negative test num. 2 - json file
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"addonProfiles": {
"omsagent": {
"enabled": true
}
},
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
]
}
Negative test num. 3 - bicep file
resource aksCluster1 'Microsoft.ContainerService/managedClusters@2020-02-01' = {
name: 'aksCluster1'
location: resourceGroup().location
properties: {
kubernetesVersion: '1.15.7'
addonProfiles: {
omsagent: {
enabled: true
}
}
dnsPrefix: 'dnsprefix'
agentPoolProfiles: [
{
name: 'agentpool'
count: 2
vmSize: 'Standard_A1'
osType: 'Linux'
storageProfile: 'ManagedDisks'
}
]
linuxProfile: {
adminUsername: 'adminUserName'
ssh: {
publicKeys: [
{
keyData: 'keyData'
}
]
}
}
servicePrincipalProfile: {
clientId: 'servicePrincipalAppId'
secret: 'servicePrincipalAppPassword'
}
networkProfile: {
networkPolicy: 'azure'
}
}
}
Negative test num. 4 - json file
{
"properties": {
"template": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"addonProfiles": {
"omsagent": {
"enabled": true
}
},
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
],
"outputs": {}
},
"parameters": {}
},
"kind": "template",
"type": "Microsoft.Blueprint/blueprints/artifacts",
"name": "myTemplate"
}