Challenge - 5 Problems
Security Audit Logging Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
💻 Command Output
intermediate2:00remaining
Jenkins audit log plugin output
You enabled the Jenkins Audit Trail plugin and configured it to log all user actions. What will be the output in the audit log file when a user named 'alice' triggers a build for job 'MyApp'?
Attempts:
2 left
💡 Hint
Audit logs record user actions like triggering builds, not errors or warnings unless configured.
✗ Incorrect
The Audit Trail plugin logs user actions such as triggering builds with INFO level messages. Errors or warnings are not part of audit logs unless an error occurs.
❓ Configuration
intermediate2:00remaining
Configuring Jenkins audit logging to file
Which configuration snippet correctly enables audit logging to a file named 'audit.log' in Jenkins?
Attempts:
2 left
💡 Hint
The correct syntax uses 'enabled true' and an absolute path for logFile.
✗ Incorrect
The Audit Trail plugin configuration requires 'enabled true' and a valid absolute path for the logFile parameter.
❓ Troubleshoot
advanced2:00remaining
Audit logs missing user info
After enabling audit logging, you notice the logs do not show which user performed actions. What is the most likely cause?
Attempts:
2 left
💡 Hint
User info depends on Jenkins authentication being active.
✗ Incorrect
If Jenkins security realm is 'None', no user authentication exists, so audit logs cannot record user info.
✅ Best Practice
advanced2:00remaining
Best practice for securing Jenkins audit logs
Which practice best secures Jenkins audit logs against unauthorized access?
Attempts:
2 left
💡 Hint
Audit logs contain sensitive info and should be protected carefully.
✗ Incorrect
Storing audit logs on a separate secured server with restricted access prevents tampering and unauthorized viewing.
🔀 Workflow
expert3:00remaining
Implementing centralized audit logging for Jenkins
You want to send Jenkins audit logs to a centralized syslog server for compliance. Which sequence of steps is correct?
Attempts:
2 left
💡 Hint
Start with local logging, then forwarding, secure the channel, then verify.
✗ Incorrect
First configure local audit logging, then forward logs via syslog agent, secure the channel, and finally verify logs arrive.