[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[[["\u003cp\u003eThis page provides an example of a Data Access audit log entry generated when a write request is sent to Bigtable.\u003c/p\u003e\n"],["\u003cp\u003eThe log entry example demonstrates key fields such as \u003ccode\u003eauthenticationInfo\u003c/code\u003e, \u003ccode\u003erequestMetadata\u003c/code\u003e, and \u003ccode\u003eauthorizationInfo\u003c/code\u003e, among others, which are part of a typical Bigtable audit log.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003emethodName\u003c/code\u003e field, in this case, is \u003ccode\u003egoogle.bigtable.v2.Bigtable.MutateRow\u003c/code\u003e, indicating a mutation operation on a Bigtable row.\u003c/p\u003e\n"],["\u003cp\u003eThe example log shows the \u003ccode\u003eresourceName\u003c/code\u003e and \u003ccode\u003etableName\u003c/code\u003e, helping to identify the specific table, instance, and project that the operation targeted.\u003c/p\u003e\n"],["\u003cp\u003eThe log contains data that can be used to track user actions such as the caller's IP address, user agent, timestamp, as well as information regarding the type of request made.\u003c/p\u003e\n"]]],[],null,["# Audit log example\n=================\n\nThis page shows an example of a Data Access audit log entry that is generated\nwhen you send a [write request](/bigtable/docs/writes) to Bigtable. For more\ndetails about audit log entries, see [Understanding audit logs](/logging/docs/audit/understanding-audit-logs). For a list of Bigtable fields that are\nlogged, see [Audit log fields](/bigtable/docs/audit-log-fields).\n\nFor brevity, some parts of the log entry are omitted, and some fields are\nhighlighted for emphasis.\n\n\u003cbr /\u003e\n\n```json\n {\n protoPayload: {\n @type: \"type.googleapis.com/google.cloud.audit.AuditLog\",\n status: {},\n authenticationInfo: {\n principalEmail: \"user@example.com\",\n serviceAccountDelegationInfo: [\n {\n firstPartyPrincipal: {\n principalEmail: \"service-123@compute-system.iam.gserviceaccount.com\"\n }\n }\n ],\n principalSubject\": \"serviceAccount:123-compute@developer.gserviceaccount.com\"\n },\n requestMetadata: {\n callerIp: \"12.586.9.1\",\n callerSuppliedUserAgent: \"bigtable-1.4.0,jdk-1.8,hbase-1.4.7 grpc-java-netty/1.10.1,gzip(gfe)\",\n requestAttributes: {\n time: \"2020-12-10T03:22:59.373508362Z\",\n auth: {}\n },\n destinationAttributes: {}\n },\n serviceName: \"bigtable.googleapis.com\",\n methodName: \"google.bigtable.v2.Bigtable.MutateRow\",\n authorizationInfo: [\n {\n resource: \"projects/test-project/instances/test-instance/tables/test-table\",\n permission: \"bigtable.tables.mutateRows\",\n granted: true,\n resourceAttributes: {}\n }\n ],\n resourceName: \"projects/test-project/instances/test-instance/tables/test-table\",\n request: {\n mutations: [\n {\n setCell: {\n familyName: \"cf1\",\n }\n }\n ],\n tableName: \"projects/test-project/instances/test-instance/tables/test-table\",\n @type: \"type.googleapis.com/google.bigtable.v2.MutateRowRequest\",\n rowKey: \"cm93LWtleQ==\"\n },\n },\n insertId: \"1wt6rdna0\",\n resource: {\n type: \"audited_resource\",\n labels: {\n service: \"bigtable.googleapis.com\",\n project_id: \"test-project\",\n method: \"google.bigtable.v2.Bigtable.MutateRow\"\n }\n },\n timestamp: \"2019-05-27T16:24:56.135Z\",\n severity: \"NOTICE\",\n logName: \"projects/test-project/logs/cloudaudit.googleapis.com%2Fdata_access\",\n receiveTimestamp: \"2020-05-27T04:56:47.427539594Z\"\n }\n```\n\n\u003cbr /\u003e"]]