// Module included in the following assemblies: // // * networking/network_security/logging-network-security.adoc :_mod-docs-content-type: PROCEDURE [id="nw-networkpolicy-audit-configure_{context}"] = Configuring egress firewall and network policy auditing for a cluster As a cluster administrator, you can customize audit logging for your cluster. .Prerequisites * Install the OpenShift CLI (`oc`). * Log in to the cluster with a user with `cluster-admin` privileges. .Procedure * To customize the audit logging configuration, enter the following command: + [source,terminal] ---- $ oc edit network.operator.openshift.io/cluster ---- + [TIP] ==== You can also customize and apply the following YAML to configure audit logging: [source,yaml] ---- apiVersion: operator.openshift.io/v1 kind: Network metadata: name: cluster spec: defaultNetwork: ovnKubernetesConfig: policyAuditConfig: destination: "null" maxFileSize: 50 rateLimit: 20 syslogFacility: local0 ---- ==== .Verification . To create a namespace with network policies complete the following steps: .. Create a namespace for verification: + [source,terminal] ---- $ cat <