1. What is the docker command to find the current logging driver for
a running container?
A. docker stats
B. docker info
C. docker config
D. docker inspect
2. When an application being managed by UCP fails, you would like a
summary of all requests made to the UCP API in the hours leading up to
the failure.
What must be configured correctly beforehand for this to be
possible?
A. UCP audit logs must be set to the metadata or request
level.
B. UCP logging levels must be set to the info or debug level.
C. All engines in the cluster must have their log driver set to the
metadata or request level.
D. Set the logging level in the config object for the
ucp-kube-api-server container to warning or higher.
Enable
audit logging on UCP
Audit Logs capture all HTTP actions (GET, PUT, POST, PATCH, DELETE)
to all UCP API, Swarm API and Kubernetes API endpoints that are invoked
(except for the ignored list) and sent to Docker Engine via stdout.
Creating audit logs is a UCP component that integrates with Swarm, K8s,
and UCP APIs.
Logging Levels
None, Metadata, Request.
Benefits
Historical Troubleshooting - Audit logs are helpful in determining a
sequence of past events that explain why an issue occured.
Security Analysis and Auditing - Security is one of the primary uses
for audit logs. A full record of all user interactions with the
container infrastructure gives your security team full visibility to
questionable or attempted unauthorized accesses.
Chargeback - You can use audit logs and information about the
resources to generate chargeback information.
Alerting - If there is a watch on an event stream or a notification
created by the event, alerting features can be built on top of event
tools that generate alerts for ops teams (PagerDuty, OpsGenie, Slack, or
custom solutions).