Audit.NET
falco-analyze-audit-log-from-k3s-cluster
Audit.NET | falco-analyze-audit-log-from-k3s-cluster | |
---|---|---|
6 | 2 | |
2,184 | 62 | |
- | - | |
9.1 | 0.0 | |
7 days ago | almost 3 years ago | |
C# | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Audit.NET
-
How would you handle audit logging to a database?
I’ve had great success using Audit.Net. It supports a variety of different data stores and I believe it logs things in a background thread…I could be wrong though. At any rate, I have been using it with the EF provider and a custom table. No issues thus far.
- [Parte 7] ASP.NET: Creando un Sistema Auditable
-
Activity Log
I've looked into this as well and kept seeing https://github.com/thepirat000/Audit.NET pop up. There's also this huge thing https://abp.io/ that has auditing as a component.
-
[EF Core] How would you handle modeling of something akin to github issues?
Sounds like you could use Audit.NET
-
How to Audit Your ASP.NET Core WebApi
Next, I started looking into different available options. I came across various libraries, compare them and finally I chose Audit.Net WebApi for the following reasons:
-
Audit Trail Implementation in ASP .NET Core with Entity Framework Core (.NET 5)
There are about a billion packages for accomplishing this, e.g. https://github.com/thepirat000/Audit.NET/tree/master/src/Audit.EntityFramework - for everyone reading this, please use tried-and-tested packages like that, instead of this yet-another-reinvention-of-the-wheel.
falco-analyze-audit-log-from-k3s-cluster
- Kubernetes Audit Logs with the Falco and Falcosidekick UI
-
Analyze Kubernetes Audit Logs with the Falco and Falcosidekick UI for the k3s cluster
I created a repository with clear documentation about how we can enable Audit logs on the k3s cluster and analyze them with the Falco and Falcosidekick + Falcosidekick UI hope it helps, all feedbacks are welcomed btw (I also created another repository that can help you to set up k3s cluster on digital ocean using Terraform + Ansible, again with the clear documentation 📷) https://github.com/developer-guy/falco-analyze-audit-log-from-k3s-cluster I highly recommended looking at this repository for beautiful falco + falcosidekick svg icons
What are some alternatives?
NSwag - The Swagger/OpenAPI toolchain for .NET, ASP.NET Core and TypeScript.
k3s-on-prem-production - Playbooks needed to set up an on-premises K3s cluster and securize it
Exceptionless - Exceptionless clients for the .NET platform
Passhash - Go library providing simple and secure password management
SQLStreamStore - Stream Store library targeting RDBMS based implementations for .NET
cluster-template - A template for deploying a Kubernetes cluster with k3s or Talos
wcf - This repo contains the client-oriented WCF libraries that enable applications built on .NET Core to communicate with WCF services.
extending-falco-outputs-with-falcosidekick - Demonstrating how you can send Falco alerts to the slack with the make use of falcosidekick
ABP - Open Source Web Application Framework for ASP.NET Core. Offers an opinionated architecture to build enterprise software solutions with best practices on top of the .NET and the ASP.NET Core platforms. Provides the fundamental infrastructure, production-ready startup templates, application modules, UI themes, tooling, guides and documentation.
falco-the-kubernetes-response-engine-using-openfaas-functions - Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions
JsonApiDotNetCore - A framework for building JSON:API compliant REST APIs using ASP.NET and Entity Framework Core.
k3s-monitoring - A quick start guide for getting a full monitoring and alerting stack up and running on your k3s cluster, with Prometheus Operator and the kube-prometheus-stack Helm Chart.