Skip to main content
NEW · APP STORE Now on iOS · macOS · iPad Android & Windows soon GET IT
Prompts Kubernetes Audit Log Security Analyzer

analyst security skill risk: low

Kubernetes Audit Log Security Analyzer

The prompt provides instructions and Python code for parsing Kubernetes API server audit logs (JSON lines) to detect events including pods/exec, secret access, RBAC modifications,…

SKILL 4 files · 2 folders

SKILL.md
---
name: analyzing-kubernetes-audit-logs
description: "Parses Kubernetes API server audit logs (JSON lines) to detect exec-into-pod, secret access, RBAC modifications,"
---
# Analyzing Kubernetes Audit Logs


## When to Use

- When investigating security incidents that require analyzing kubernetes audit logs
- When building detection rules or threat hunting queries for this domain
- When SOC analysts need structured procedures for this analysis type
- When validating security monitoring coverage for related attack techniques

## Prerequisites

- Familiarity with container security concepts and tools
- Access to a test or lab environment for safe execution
- Python 3.8+ with required dependencies installed
- Appropriate authorization for any testing activities

## Instructions

Parse Kubernetes audit log files (JSON lines format) to detect security-relevant
events including unauthorized access, privilege escalation, and data exfiltration.

```python
import json

with open("/var/log/kubernetes/audit.log") as f:
    for line in f:
        event = json.loads(line)
        verb = event.get("verb")
        resource = event.get("objectRef", {}).get("resource")
        user = event.get("user", {}).get("username")
        if verb == "create" and resource == "pods/exec":
            print(f"Pod exec by {user}")
```

Key events to detect:
1. pods/exec and pods/attach (shell into containers)
2. secrets access (get/list/watch)
3. clusterrolebindings creation (RBAC escalation)
4. Privileged pod creation
5. Anonymous or system:unauthenticated access

## Examples

```python
# Detect secret enumeration
if verb in ("get", "list") and resource == "secrets":
    print(f"Secret access: {user} -> {event['objectRef'].get('name')}")
```

REQUIRED CONTEXT

  • kubernetes audit log file in JSON lines format

EXPECTED OUTPUT

Format
plain_text
Constraints
  • print detected events with relevant details

EXAMPLES

Includes two Python code examples demonstrating detection of pod exec and secret access events.

CAVEATS

Dependencies
  • Familiarity with container security concepts and tools
  • Access to a test or lab environment for safe execution
  • Python 3.8+ with required dependencies installed
  • Appropriate authorization for any testing activities
Missing context
  • Target output format (e.g., JSON report, console, SIEM integration)
  • Exact Kubernetes audit log schema version or fields to expect
Ambiguities
  • Code snippet is incomplete and does not show how to handle all listed key events
  • Does not specify desired output format or logging level

QUALITY

OVERALL
0.65
CLARITY
0.72
SPECIFICITY
0.58
REUSABILITY
0.68
COMPLETENESS
0.62

IMPROVEMENT SUGGESTIONS

  • Provide a complete, runnable Python script skeleton with functions for each detection rule
  • Add explicit output schema or example result object

USAGE

Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.

MORE FOR ANALYST