Kubernetes GCP Detect Service Accounts Forbidden Failure Access
This search provides information on Kubernetes service accounts with failure or forbidden access status, this search can be extended by using top or rare operators to find trends or rarities in failure status, user agents, source IPs and request URI
This content is not mapped to any local saved search. Add mapping
Kubernetes GCP Detect Service Accounts Forbidden Failure Access Help
You must install splunk add on for GCP. This search works with pubsub messaging service logs.
Open in Search