All audit records must identify any containers associated with the event within Rancher RKE2.

STIG ID: CNTR-R2-000320  |  SRG: SRG-APP-000100-CTR-000200 |  Severity: medium |  CCI: CCI-001487 |  Vulnerability Id: V-254563

Vulnerability Discussion

Ensure that the --audit-log-maxage argument is set to 30 or as appropriate.

Retaining logs for at least 30 days ensures that you can go back in time and investigate or correlate any events. Set your audit log retention period to 30 days or as per your business requirements.
Result: Pass

Check

Ensure audit-log-maxage is set correctly.

Run the below command on the RKE2 Control Plane:
/bin/ps -ef | grep kube-apiserver | grep -v grep

If --audit-log-maxage argument is not set to at least 30 or is not configured, this is a finding.
(By default, RKE2 sets the --audit-log-maxage argument parameter to 30.)

Fix

Edit the RKE2 Configuration File /etc/rancher/rke2/config.yaml on the RKE2 Control Plane and set the following "kube-apiserver-arg" argument:

- audit-log-maxage=30

Once the configuration file is updated, restart the RKE2 Server. Run the command:
systemctl restart rke2-server