diff --git a/cluster/gce/gci/configure-helper.sh b/cluster/gce/gci/configure-helper.sh index bf3c8851ac8..63db6f1623d 100644 --- a/cluster/gce/gci/configure-helper.sh +++ b/cluster/gce/gci/configure-helper.sh @@ -1630,6 +1630,7 @@ function start-kube-apiserver { create-master-audit-policy "${audit_policy_file}" "${ADVANCED_AUDIT_POLICY:-}" audit_policy_config_mount="{\"name\": \"auditpolicyconfigmount\",\"mountPath\": \"${audit_policy_file}\", \"readOnly\": true}," audit_policy_config_volume="{\"name\": \"auditpolicyconfigmount\",\"hostPath\": {\"path\": \"${audit_policy_file}\", \"type\": \"FileOrCreate\"}}," + if [[ "${ADVANCED_AUDIT_BACKEND:-log}" == *"log"* ]]; then # The advanced audit log backend config matches the basic audit log config. params+=" --audit-log-path=/var/log/kube-apiserver-audit.log" diff --git a/test/e2e/auth/audit_dynamic.go b/test/e2e/auth/audit_dynamic.go index 9e9080a95be..e74ec61bcb9 100644 --- a/test/e2e/auth/audit_dynamic.go +++ b/test/e2e/auth/audit_dynamic.go @@ -155,13 +155,11 @@ var _ = SIGDescribe("[Feature:DynamicAudit]", func() { _, err = f.ClientSet.AuditregistrationV1alpha1().AuditSinks().Create(&sink) framework.ExpectNoError(err, "failed to create audit sink") framework.Logf("created audit sink") - fmt.Println("created audit sink") // check that we are receiving logs in the proxy err = wait.Poll(100*time.Millisecond, 10*time.Second, func() (done bool, err error) { logs, err := framework.GetPodLogs(f.ClientSet, namespace, "audit-proxy", "proxy") if err != nil { - fmt.Println("could not get pod logs: ", err) return false, nil } if logs == "" {