diff --git a/audit/projects/k8s-infra-project-jedha/description.json b/audit/projects/k8s-infra-project-jedha/description.json new file mode 100644 index 000000000000..ad7b578c423f --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/description.json @@ -0,0 +1,11 @@ +{ + "createTime": "2021-07-10T12:35:00.145Z", + "lifecycleState": "ACTIVE", + "name": "k8s-infra-project-jedha", + "parent": { + "id": "758905017065", + "type": "organization" + }, + "projectId": "k8s-infra-project-jedha", + "projectNumber": "1088262075988" +} diff --git a/audit/projects/k8s-infra-project-jedha/iam.json b/audit/projects/k8s-infra-project-jedha/iam.json new file mode 100644 index 000000000000..3ac1339df7e9 --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/iam.json @@ -0,0 +1,70 @@ +{ + "bindings": [ + { + "members": [ + "serviceAccount:service-1088262075988@compute-system.iam.gserviceaccount.com" + ], + "role": "roles/compute.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-1088262075988@container-engine-robot.iam.gserviceaccount.com" + ], + "role": "roles/container.serviceAgent" + }, + { + "members": [ + "serviceAccount:service-1088262075988@containerregistry.iam.gserviceaccount.com" + ], + "role": "roles/containerregistry.ServiceAgent" + }, + { + "members": [ + "serviceAccount:1088262075988-compute@developer.gserviceaccount.com", + "serviceAccount:1088262075988@cloudservices.gserviceaccount.com" + ], + "role": "roles/editor" + }, + { + "members": [ + "serviceAccount:tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com", + "serviceAccount:tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com" + ], + "role": "roles/logging.logWriter" + }, + { + "members": [ + "serviceAccount:tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com", + "serviceAccount:tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com" + ], + "role": "roles/monitoring.metricWriter" + }, + { + "members": [ + "serviceAccount:tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com", + "serviceAccount:tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com" + ], + "role": "roles/monitoring.viewer" + }, + { + "members": [ + "user:ameukam@gmail.com" + ], + "role": "roles/owner" + }, + { + "members": [ + "serviceAccount:service-1088262075988@gcp-sa-pubsub.iam.gserviceaccount.com" + ], + "role": "roles/pubsub.serviceAgent" + }, + { + "members": [ + "serviceAccount:tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com", + "serviceAccount:tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com" + ], + "role": "roles/stackdriver.resourceMetadata.writer" + } + ], + "version": 1 +} diff --git a/audit/projects/k8s-infra-project-jedha/service-accounts/1088262075988-compute@developer.gserviceaccount.com/description.json b/audit/projects/k8s-infra-project-jedha/service-accounts/1088262075988-compute@developer.gserviceaccount.com/description.json new file mode 100644 index 000000000000..8aad136597f5 --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/service-accounts/1088262075988-compute@developer.gserviceaccount.com/description.json @@ -0,0 +1,9 @@ +{ + "disabled": true, + "displayName": "Compute Engine default service account", + "email": "1088262075988-compute@developer.gserviceaccount.com", + "name": "projects/k8s-infra-project-jedha/serviceAccounts/1088262075988-compute@developer.gserviceaccount.com", + "oauth2ClientId": "106911913404991129722", + "projectId": "k8s-infra-project-jedha", + "uniqueId": "106911913404991129722" +} diff --git a/audit/projects/k8s-infra-project-jedha/service-accounts/1088262075988-compute@developer.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-project-jedha/service-accounts/1088262075988-compute@developer.gserviceaccount.com/iam.json new file mode 100644 index 000000000000..0967ef424bce --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/service-accounts/1088262075988-compute@developer.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com/description.json new file mode 100644 index 000000000000..f57fd97a640f --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Terraform-managed service account for cluster registry-cluster-us", + "email": "tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com", + "name": "projects/k8s-infra-project-jedha/serviceAccounts/tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com", + "oauth2ClientId": "107487212080222156284", + "projectId": "k8s-infra-project-jedha", + "uniqueId": "107487212080222156284" +} diff --git a/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com/iam.json new file mode 100644 index 000000000000..0967ef424bce --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com/description.json b/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com/description.json new file mode 100644 index 000000000000..19f509e50a53 --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com/description.json @@ -0,0 +1,8 @@ +{ + "displayName": "Terraform-managed service account for cluster registry-cluster-us", + "email": "tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com", + "name": "projects/k8s-infra-project-jedha/serviceAccounts/tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com", + "oauth2ClientId": "107475807005918167785", + "projectId": "k8s-infra-project-jedha", + "uniqueId": "107475807005918167785" +} diff --git a/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com/iam.json b/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com/iam.json new file mode 100644 index 000000000000..0967ef424bce --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/service-accounts/tf-gke-registry-cluste-rz2r@k8s-infra-project-jedha.iam.gserviceaccount.com/iam.json @@ -0,0 +1 @@ +{} diff --git a/audit/projects/k8s-infra-project-jedha/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-infra-project-jedha/services/bigquery/bigquery.datasets.json new file mode 100644 index 000000000000..e69de29bb2d1 diff --git a/audit/projects/k8s-infra-project-jedha/services/compute/project-info.json b/audit/projects/k8s-infra-project-jedha/services/compute/project-info.json new file mode 100644 index 000000000000..f884b41aed07 --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/services/compute/project-info.json @@ -0,0 +1,177 @@ +{ + "commonInstanceMetadata": { + "items": [ + { + "key": "gke-registry-cluster-us-33d4327e-secondary-ranges", + "value": "services:vpc-registry-us:registry-us:registry-cluster-us-services-range,shareable-pods:vpc-registry-us:registry-us:registry-cluster-us-pods-range" + } + ], + "kind": "compute#metadata" + }, + "creationTimestamp": "2021-07-10T05:35:31.563-07:00", + "defaultNetworkTier": "PREMIUM", + "defaultServiceAccount": "1088262075988-compute@developer.gserviceaccount.com", + "id": "1841451747995036412", + "kind": "compute#project", + "name": "k8s-infra-project-jedha", + "quotas": [ + { + "limit": 10000, + "metric": "SNAPSHOTS" + }, + { + "limit": 30, + "metric": "NETWORKS" + }, + { + "limit": 500, + "metric": "FIREWALLS" + }, + { + "limit": 5000, + "metric": "IMAGES" + }, + { + "limit": 175, + "metric": "STATIC_ADDRESSES" + }, + { + "limit": 300, + "metric": "ROUTES" + }, + { + "limit": 150, + "metric": "FORWARDING_RULES" + }, + { + "limit": 500, + "metric": "TARGET_POOLS" + }, + { + "limit": 500, + "metric": "HEALTH_CHECKS" + }, + { + "limit": 575, + "metric": "IN_USE_ADDRESSES" + }, + { + "limit": 500, + "metric": "TARGET_INSTANCES" + }, + { + "limit": 100, + "metric": "TARGET_HTTP_PROXIES" + }, + { + "limit": 100, + "metric": "URL_MAPS" + }, + { + "limit": 30, + "metric": "BACKEND_SERVICES" + }, + { + "limit": 1000, + "metric": "INSTANCE_TEMPLATES" + }, + { + "limit": 50, + "metric": "TARGET_VPN_GATEWAYS" + }, + { + "limit": 100, + "metric": "VPN_TUNNELS" + }, + { + "limit": 30, + "metric": "BACKEND_BUCKETS" + }, + { + "limit": 20, + "metric": "ROUTERS" + }, + { + "limit": 100, + "metric": "TARGET_SSL_PROXIES" + }, + { + "limit": 100, + "metric": "TARGET_HTTPS_PROXIES" + }, + { + "limit": 100, + "metric": "SSL_CERTIFICATES" + }, + { + "limit": 275, + "metric": "SUBNETWORKS" + }, + { + "limit": 100, + "metric": "TARGET_TCP_PROXIES" + }, + { + "limit": 10, + "metric": "SECURITY_POLICIES" + }, + { + "limit": 200, + "metric": "SECURITY_POLICY_RULES" + }, + { + "limit": 1000, + "metric": "XPN_SERVICE_PROJECTS" + }, + { + "limit": 150, + "metric": "PACKET_MIRRORINGS" + }, + { + "limit": 1000, + "metric": "NETWORK_ENDPOINT_GROUPS" + }, + { + "limit": 6, + "metric": "INTERCONNECTS" + }, + { + "limit": 5000, + "metric": "GLOBAL_INTERNAL_ADDRESSES" + }, + { + "limit": 50, + "metric": "VPN_GATEWAYS" + }, + { + "limit": 5000, + "metric": "MACHINE_IMAGES" + }, + { + "limit": 20, + "metric": "SECURITY_POLICY_CEVAL_RULES" + }, + { + "limit": 50, + "metric": "EXTERNAL_VPN_GATEWAYS" + }, + { + "limit": 1, + "metric": "PUBLIC_ADVERTISED_PREFIXES" + }, + { + "limit": 10, + "metric": "PUBLIC_DELEGATED_PREFIXES" + }, + { + "limit": 1024, + "metric": "STATIC_BYOIP_ADDRESSES" + }, + { + "limit": 150, + "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" + } + ], + "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-infra-project-jedha", + "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" +} diff --git a/audit/projects/k8s-infra-project-jedha/services/container/clusters/registry-cluster-us.json b/audit/projects/k8s-infra-project-jedha/services/container/clusters/registry-cluster-us.json new file mode 100644 index 000000000000..7677e573036a --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/services/container/clusters/registry-cluster-us.json @@ -0,0 +1,192 @@ +{ + "addonsConfig": { + "gcePersistentDiskCsiDriverConfig": { + "enabled": true + }, + "horizontalPodAutoscaling": {}, + "httpLoadBalancing": {}, + "kubernetesDashboard": { + "disabled": true + }, + "networkPolicyConfig": {} + }, + "autopilot": {}, + "autoscaling": {}, + "binaryAuthorization": {}, + "clusterIpv4Cidr": "192.168.0.0/18", + "createTime": "2021-07-10T15:37:05+00:00", + "currentMasterVersion": "1.21.1-gke.2200", + "currentNodeVersion": "1.20.6-gke.1400 *", + "databaseEncryption": { + "state": "DECRYPTED" + }, + "defaultMaxPodsConstraint": { + "maxPodsPerNode": "110" + }, + "endpoint": "34.105.80.78", + "id": "33d4327e4c494ab19c45cd5e64944a99f6e828948c3b416c9ba9ed0c1947202d", + "initialClusterVersion": "1.20.6-gke.1400", + "instanceGroupUrls": [ + "https://www.googleapis.com/compute/v1/projects/k8s-infra-project-jedha/zones/us-west1-a/instanceGroupManagers/gke-registry-cluster-us-registry-53ce7104-grp", + "https://www.googleapis.com/compute/v1/projects/k8s-infra-project-jedha/zones/us-west1-b/instanceGroupManagers/gke-registry-cluster-us-registry-b59fc79d-grp", + "https://www.googleapis.com/compute/v1/projects/k8s-infra-project-jedha/zones/us-west1-c/instanceGroupManagers/gke-registry-cluster-us-registry-8a3058a7-grp" + ], + "ipAllocationPolicy": { + "clusterIpv4Cidr": "192.168.0.0/18", + "clusterIpv4CidrBlock": "192.168.0.0/18", + "clusterSecondaryRangeName": "registry-cluster-us-pods-range", + "servicesIpv4Cidr": "192.168.64.0/18", + "servicesIpv4CidrBlock": "192.168.64.0/18", + "servicesSecondaryRangeName": "registry-cluster-us-services-range", + "useIpAliases": true + }, + "labelFingerprint": "a9dc16a7", + "legacyAbac": {}, + "location": "us-west1", + "locations": [ + "us-west1-a", + "us-west1-b", + "us-west1-c" + ], + "loggingService": "logging.googleapis.com/kubernetes", + "maintenancePolicy": { + "resourceVersion": "ce912209", + "window": { + "dailyMaintenanceWindow": { + "duration": "PT4H0M0S", + "startTime": "05:00" + } + } + }, + "masterAuthorizedNetworksConfig": {}, + "monitoringService": "monitoring.googleapis.com/kubernetes", + "name": "registry-cluster-us", + "network": "vpc-registry-us", + "networkConfig": { + "defaultSnatStatus": {}, + "network": "projects/k8s-infra-project-jedha/global/networks/vpc-registry-us", + "subnetwork": "projects/k8s-infra-project-jedha/regions/us-west1/subnetworks/registry-us" + }, + "networkPolicy": { + "enabled": true, + "provider": "CALICO" + }, + "nodeConfig": { + "diskSizeGb": 100, + "diskType": "pd-ssd", + "imageType": "UBUNTU_CONTAINERD", + "labels": { + "cluster_name": "registry-cluster-us", + "node_pool": "registry" + }, + "machineType": "n2d-standard-8", + "metadata": { + "cluster_name": "registry-cluster-us", + "disable-legacy-endpoints": "true", + "node_pool": "registry" + }, + "oauthScopes": [ + "https://www.googleapis.com/auth/cloud-platform" + ], + "serviceAccount": "tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com", + "shieldedInstanceConfig": { + "enableIntegrityMonitoring": true + }, + "tags": [ + "gke-registry-cluster-us", + "gke-registry-cluster-us-registry" + ], + "workloadMetadataConfig": { + "mode": "GKE_METADATA" + } + }, + "nodePools": [ + { + "autoscaling": { + "enabled": true, + "maxNodeCount": 10, + "minNodeCount": 1 + }, + "config": { + "diskSizeGb": 100, + "diskType": "pd-ssd", + "imageType": "UBUNTU_CONTAINERD", + "labels": { + "cluster_name": "registry-cluster-us", + "node_pool": "registry" + }, + "machineType": "n2d-standard-8", + "metadata": { + "cluster_name": "registry-cluster-us", + "disable-legacy-endpoints": "true", + "node_pool": "registry" + }, + "oauthScopes": [ + "https://www.googleapis.com/auth/cloud-platform" + ], + "serviceAccount": "tf-gke-registry-cluste-l9yw@k8s-infra-project-jedha.iam.gserviceaccount.com", + "shieldedInstanceConfig": { + "enableIntegrityMonitoring": true + }, + "tags": [ + "gke-registry-cluster-us", + "gke-registry-cluster-us-registry" + ], + "workloadMetadataConfig": { + "mode": "GKE_METADATA" + } + }, + "initialNodeCount": 1, + "instanceGroupUrls": [ + "https://www.googleapis.com/compute/v1/projects/k8s-infra-project-jedha/zones/us-west1-a/instanceGroupManagers/gke-registry-cluster-us-registry-53ce7104-grp", + "https://www.googleapis.com/compute/v1/projects/k8s-infra-project-jedha/zones/us-west1-b/instanceGroupManagers/gke-registry-cluster-us-registry-b59fc79d-grp", + "https://www.googleapis.com/compute/v1/projects/k8s-infra-project-jedha/zones/us-west1-c/instanceGroupManagers/gke-registry-cluster-us-registry-8a3058a7-grp" + ], + "locations": [ + "us-west1-a", + "us-west1-b", + "us-west1-c" + ], + "management": { + "autoRepair": true, + "autoUpgrade": true + }, + "maxPodsConstraint": { + "maxPodsPerNode": "110" + }, + "name": "registry", + "podIpv4CidrSize": 24, + "selfLink": "https://container.googleapis.com/v1/projects/k8s-infra-project-jedha/locations/us-west1/clusters/registry-cluster-us/nodePools/registry", + "upgradeSettings": { + "maxSurge": 1 + }, + "version": "1.20.6-gke.1400" + } + ], + "notificationConfig": { + "pubsub": {} + }, + "privateClusterConfig": { + "enablePrivateNodes": true, + "masterIpv4CidrBlock": "10.0.0.0/28", + "peeringName": "gke-nf22cd1487e81fa2d1a7-96f5-c5e2-peer", + "privateEndpoint": "10.0.0.2", + "publicEndpoint": "34.105.80.78" + }, + "releaseChannel": { + "channel": "RAPID" + }, + "selfLink": "https://container.googleapis.com/v1/projects/k8s-infra-project-jedha/locations/us-west1/clusters/registry-cluster-us", + "servicesIpv4Cidr": "192.168.64.0/18", + "shieldedNodes": { + "enabled": true + }, + "subnetwork": "registry-us", + "verticalPodAutoscaling": { + "enabled": true + }, + "workloadIdentityConfig": { + "workloadPool": "k8s-infra-project-jedha.svc.id.goog" + }, + "zone": "us-west1" +} diff --git a/audit/projects/k8s-infra-project-jedha/services/enabled.txt b/audit/projects/k8s-infra-project-jedha/services/enabled.txt new file mode 100644 index 000000000000..3c69d620c441 --- /dev/null +++ b/audit/projects/k8s-infra-project-jedha/services/enabled.txt @@ -0,0 +1,15 @@ +NAME TITLE +bigquery.googleapis.com BigQuery API +bigquerystorage.googleapis.com BigQuery Storage API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +cloudresourcemanager.googleapis.com Cloud Resource Manager API +compute.googleapis.com Compute Engine API +container.googleapis.com Kubernetes Engine API +containerregistry.googleapis.com Container Registry API +iam.googleapis.com Identity and Access Management (IAM) API +iamcredentials.googleapis.com IAM Service Account Credentials API +monitoring.googleapis.com Cloud Monitoring API +oslogin.googleapis.com Cloud OS Login API +pubsub.googleapis.com Cloud Pub/Sub API +serviceusage.googleapis.com Service Usage API +storage-api.googleapis.com Google Cloud Storage JSON API diff --git a/audit/projects/k8s-release/buckets/k8s-release/iam.json b/audit/projects/k8s-release/buckets/k8s-release/iam.json index c29862cf2b96..c59d5ac59b54 100644 --- a/audit/projects/k8s-release/buckets/k8s-release/iam.json +++ b/audit/projects/k8s-release/buckets/k8s-release/iam.json @@ -10,7 +10,8 @@ }, { "members": [ - "projectViewer:k8s-release" + "projectViewer:k8s-release", + "serviceAccount:project-304687256732@storage-transfer-service.iam.gserviceaccount.com" ], "role": "roles/storage.legacyBucketReader" }, @@ -25,7 +26,8 @@ "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", "group:k8s-infra-release-admins@kubernetes.io", - "group:k8s-infra-release-editors@kubernetes.io" + "group:k8s-infra-release-editors@kubernetes.io", + "serviceAccount:project-304687256732@storage-transfer-service.iam.gserviceaccount.com" ], "role": "roles/storage.objectAdmin" }, diff --git a/audit/projects/k8s-release/buckets/k8s-release/metadata.txt b/audit/projects/k8s-release/buckets/k8s-release/metadata.txt index 9e900145e668..95c67afdc053 100644 --- a/audit/projects/k8s-release/buckets/k8s-release/metadata.txt +++ b/audit/projects/k8s-release/buckets/k8s-release/metadata.txt @@ -11,8 +11,8 @@ gs://k8s-release/ : Labels: None Default KMS key: None Time created: Fri, 07 Aug 2020 20:50:17 GMT - Time updated: Fri, 07 Aug 2020 20:50:37 GMT - Metageneration: 9 + Time updated: Fri, 09 Jul 2021 20:06:14 GMT + Metageneration: 10 Bucket Policy Only enabled: True ACL: [] Default ACL: [] diff --git a/audit/projects/k8s-release/iam.json b/audit/projects/k8s-release/iam.json index a5017c1e7b54..c2d1b0791720 100644 --- a/audit/projects/k8s-release/iam.json +++ b/audit/projects/k8s-release/iam.json @@ -50,6 +50,12 @@ ], "role": "roles/editor" }, + { + "members": [ + "serviceAccount:cloud-ingest-dcp@cloud-ingest-prod.iam.gserviceaccount.com" + ], + "role": "roles/pubsub.editor" + }, { "members": [ "group:k8s-infra-release-admins@kubernetes.io", diff --git a/audit/projects/k8s-release/services/logging/logs.json b/audit/projects/k8s-release/services/logging/logs.json index fe51488c7066..437f6d9437fe 100644 --- a/audit/projects/k8s-release/services/logging/logs.json +++ b/audit/projects/k8s-release/services/logging/logs.json @@ -1 +1,3 @@ -[] +[ + "projects/k8s-release/logs/cloudaudit.googleapis.com%2Factivity" +] diff --git a/audit/projects/k8s-staging-cluster-api-gcp/services/logging/logs.json b/audit/projects/k8s-staging-cluster-api-gcp/services/logging/logs.json index 24fdf5d8823e..cb825c8f1a07 100644 --- a/audit/projects/k8s-staging-cluster-api-gcp/services/logging/logs.json +++ b/audit/projects/k8s-staging-cluster-api-gcp/services/logging/logs.json @@ -2,6 +2,5 @@ "projects/k8s-staging-cluster-api-gcp/logs/cloudaudit.googleapis.com%2Factivity", "projects/k8s-staging-cluster-api-gcp/logs/cloudaudit.googleapis.com%2Fdata_access", "projects/k8s-staging-cluster-api-gcp/logs/cloudaudit.googleapis.com%2Fsystem_event", - "projects/k8s-staging-cluster-api-gcp/logs/cloudbuild", - "projects/k8s-staging-cluster-api-gcp/logs/compute.googleapis.com%2Fshielded_vm_integrity" + "projects/k8s-staging-cluster-api-gcp/logs/cloudbuild" ] diff --git a/audit/projects/kubernetes-public/services/container/clusters/aaa.json b/audit/projects/kubernetes-public/services/container/clusters/aaa.json index e95b354b57c2..48a658f70061 100644 --- a/audit/projects/kubernetes-public/services/container/clusters/aaa.json +++ b/audit/projects/kubernetes-public/services/container/clusters/aaa.json @@ -37,7 +37,7 @@ "clusterIpv4Cidr": "10.40.0.0/14", "createTime": "2019-09-18T23:39:24+00:00", "currentMasterVersion": "1.19.9-gke.1900", - "currentNodeVersion": "1.18.17-gke.1901 *", + "currentNodeVersion": "1.19.9-gke.1900", "databaseEncryption": { "state": "DECRYPTED" }, @@ -168,7 +168,7 @@ "upgradeSettings": { "maxSurge": 1 }, - "version": "1.18.17-gke.1901" + "version": "1.19.9-gke.1900" }, { "autoscaling": { @@ -219,7 +219,7 @@ "upgradeSettings": { "maxSurge": 1 }, - "version": "1.18.17-gke.1901" + "version": "1.19.9-gke.1900" } ], "releaseChannel": {