Skip to content

K8S Audit Log

Request to GET Physical K8s audit logs that matches the criteria in request for a given namespace. If no match conditions are specified in the request, then the response contains all CRUD operations performed in the namespace. User with access to the system namespace may query for audit logs across all namespaces in a K8s Cluster.

ToolDescription
f5xc-api-sites-k8s-audit-log-createK8s Audit Log Query.
ParameterDescriptionExample
namespaceNamespace-
siteSite-

Ask Claude to help you work with K8S Audit Log resources:

“Create a k8s-audit-log named ‘example’ in the ‘production’ namespace”

Terminal window
# List resources
curl -X GET "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/k8s_audit_logs" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}" \
-H "Content-Type: application/json"
# Get specific resource
curl -X GET "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/k8s_audit_logs/<name>" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}" \
-H "Content-Type: application/json"
# Create resource
curl -X POST "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/k8s_audit_logs" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}" \
-H "Content-Type: application/json" \
-d @k8s_audit_log.json
# Delete resource
curl -X DELETE "https://${TENANT}.console.ves.volterra.io/api/config/namespaces/${NAMESPACE}/k8s_audit_logs/<name>" \
-H "Authorization: APIToken ${F5XC_API_TOKEN}"