AKS Logging To Azure Monitoring Is Disabled

  • Query id: 9b09dee1-f09b-4013-91d2-158fa4695f4b
  • Query name: AKS Logging To Azure Monitoring Is Disabled
  • Platform: AzureResourceManager
  • Severity: Medium
  • Category: Observability
  • URL: Github

Description

Azure Kubernetes Service should have logging to Azure Monitoring enabled.
Documentation

Code samples

Code samples with security vulnerabilities

Positive test num. 1 - json file
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "resources": [
    {
      "name": "aksCluster1",
      "type": "Microsoft.ContainerService/managedClusters",
      "apiVersion": "2020-02-01",
      "location": "[resourceGroup().location]",
      "properties": {
        "kubernetesVersion": "1.15.7",
        "addonProfiles": {
          "omsagent": {
            "enabled": false
          }
        },
        "dnsPrefix": "dnsprefix",
        "agentPoolProfiles": [
          {
            "name": "agentpool",
            "count": 2,
            "vmSize": "Standard_A1",
            "osType": "Linux",
            "storageProfile": "ManagedDisks"
          }
        ],
        "linuxProfile": {
          "adminUsername": "adminUserName",
          "ssh": {
            "publicKeys": [
              {
                "keyData": "keyData"
              }
            ]
          }
        },
        "servicePrincipalProfile": {
          "clientId": "servicePrincipalAppId",
          "secret": "servicePrincipalAppPassword"
        },
        "networkProfile": {
          "networkPolicy": "azure"
        }
      }
    }
  ]
}
Positive test num. 2 - json file
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "resources": [
    {
      "name": "aksCluster1",
      "type": "Microsoft.ContainerService/managedClusters",
      "apiVersion": "2020-02-01",
      "location": "[resourceGroup().location]",
      "properties": {
        "kubernetesVersion": "1.15.7",
        "dnsPrefix": "dnsprefix",
        "agentPoolProfiles": [
          {
            "name": "agentpool",
            "count": 2,
            "vmSize": "Standard_A1",
            "osType": "Linux",
            "storageProfile": "ManagedDisks"
          }
        ],
        "linuxProfile": {
          "adminUsername": "adminUserName",
          "ssh": {
            "publicKeys": [
              {
                "keyData": "keyData"
              }
            ]
          }
        },
        "servicePrincipalProfile": {
          "clientId": "servicePrincipalAppId",
          "secret": "servicePrincipalAppPassword"
        },
        "networkProfile": {
          "networkPolicy": "azure"
        }
      }
    }
  ]
}
Positive test num. 3 - json file
{
  "properties": {
    "template": {
      "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
      "contentVersion": "1.0.0.0",
      "resources": [
        {
          "name": "aksCluster1",
          "type": "Microsoft.ContainerService/managedClusters",
          "apiVersion": "2020-02-01",
          "location": "[resourceGroup().location]",
          "properties": {
            "kubernetesVersion": "1.15.7",
            "addonProfiles": {
              "omsagent": {
                "enabled": false
              }
            },
            "dnsPrefix": "dnsprefix",
            "agentPoolProfiles": [
              {
                "name": "agentpool",
                "count": 2,
                "vmSize": "Standard_A1",
                "osType": "Linux",
                "storageProfile": "ManagedDisks"
              }
            ],
            "linuxProfile": {
              "adminUsername": "adminUserName",
              "ssh": {
                "publicKeys": [
                  {
                    "keyData": "keyData"
                  }
                ]
              }
            },
            "servicePrincipalProfile": {
              "clientId": "servicePrincipalAppId",
              "secret": "servicePrincipalAppPassword"
            },
            "networkProfile": {
              "networkPolicy": "azure"
            }
          }
        }
      ],
      "outputs": {}
    },
    "parameters": {}
  },
  "kind": "template",
  "type": "Microsoft.Blueprint/blueprints/artifacts",
  "name": "myTemplate"
}

Positive test num. 4 - json file
{
  "properties": {
    "template": {
      "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
      "contentVersion": "1.0.0.0",
      "resources": [
        {
          "name": "aksCluster1",
          "type": "Microsoft.ContainerService/managedClusters",
          "apiVersion": "2020-02-01",
          "location": "[resourceGroup().location]",
          "properties": {
            "kubernetesVersion": "1.15.7",
            "dnsPrefix": "dnsprefix",
            "agentPoolProfiles": [
              {
                "name": "agentpool",
                "count": 2,
                "vmSize": "Standard_A1",
                "osType": "Linux",
                "storageProfile": "ManagedDisks"
              }
            ],
            "linuxProfile": {
              "adminUsername": "adminUserName",
              "ssh": {
                "publicKeys": [
                  {
                    "keyData": "keyData"
                  }
                ]
              }
            },
            "servicePrincipalProfile": {
              "clientId": "servicePrincipalAppId",
              "secret": "servicePrincipalAppPassword"
            },
            "networkProfile": {
              "networkPolicy": "azure"
            }
          }
        }
      ],
      "outputs": {}
    },
    "parameters": {}
  },
  "kind": "template",
  "type": "Microsoft.Blueprint/blueprints/artifacts",
  "name": "myTemplate"
}

Code samples without security vulnerabilities

Negative test num. 1 - json file
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "resources": [
    {
      "name": "aksCluster1",
      "type": "Microsoft.ContainerService/managedClusters",
      "apiVersion": "2020-02-01",
      "location": "[resourceGroup().location]",
      "properties": {
        "kubernetesVersion": "1.15.7",
        "addonProfiles": {
          "omsagent": {
            "enabled": true
          }
        },
        "dnsPrefix": "dnsprefix",
        "agentPoolProfiles": [
          {
            "name": "agentpool",
            "count": 2,
            "vmSize": "Standard_A1",
            "osType": "Linux",
            "storageProfile": "ManagedDisks"
          }
        ],
        "linuxProfile": {
          "adminUsername": "adminUserName",
          "ssh": {
            "publicKeys": [
              {
                "keyData": "keyData"
              }
            ]
          }
        },
        "servicePrincipalProfile": {
          "clientId": "servicePrincipalAppId",
          "secret": "servicePrincipalAppPassword"
        },
        "networkProfile": {
          "networkPolicy": "azure"
        }
      }
    }
  ]
}
Negative test num. 2 - json file
{
  "properties": {
    "template": {
      "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
      "contentVersion": "1.0.0.0",
      "resources": [
        {
          "name": "aksCluster1",
          "type": "Microsoft.ContainerService/managedClusters",
          "apiVersion": "2020-02-01",
          "location": "[resourceGroup().location]",
          "properties": {
            "kubernetesVersion": "1.15.7",
            "addonProfiles": {
              "omsagent": {
                "enabled": true
              }
            },
            "dnsPrefix": "dnsprefix",
            "agentPoolProfiles": [
              {
                "name": "agentpool",
                "count": 2,
                "vmSize": "Standard_A1",
                "osType": "Linux",
                "storageProfile": "ManagedDisks"
              }
            ],
            "linuxProfile": {
              "adminUsername": "adminUserName",
              "ssh": {
                "publicKeys": [
                  {
                    "keyData": "keyData"
                  }
                ]
              }
            },
            "servicePrincipalProfile": {
              "clientId": "servicePrincipalAppId",
              "secret": "servicePrincipalAppPassword"
            },
            "networkProfile": {
              "networkPolicy": "azure"
            }
          }
        }
      ],
      "outputs": {}
    },
    "parameters": {}
  },
  "kind": "template",
  "type": "Microsoft.Blueprint/blueprints/artifacts",
  "name": "myTemplate"
}