Skip to main content
Google Cloud
/
  • English
  • Deutsch
  • Español – América Latina
  • Français
  • Indonesia
  • Italiano
  • Português – Brasil
  • 中文 – 简体
  • 中文 – 繁體
  • 日本語
  • 한국어
Console Sign in
  • Google Distributed Cloud air-gapped appliance
Overview Documentation Reference
Contact Us Start free
Google Cloud
  • Docs
    • Overview
    • Documentation
    • Reference
  • Console
  • Contact Us
  • Start free
  • Discover
  • Product overview
  • Release notes
    • 1.0
  • Glossary
  • Accessibility
  • Feature stages
  • gdcloud Command-Line Interface (CLI)
    • Overview
    • Download
    • Install
    • Manage configurations
    • Manage properties
    • Upgrade
    • Autocomplete
    • View and switch context
    • Authenticate
    • Enable accessibility features
  • Request support
  • Configure
  • Overview
  • Connect to the device
  • Set up and configure device
    • Prerequisites
    • Verify cabling
    • Create input configuration file
    • Configure device and install software
  • Configure advanced settings
    • Configure external NTP
    • Configure external HSM network connection
    • Set up IO tools to access runbooks
    • Configure a SMTP notification channel for alerts
    • Manage PKI certs
      • Web TLS certificate configurations
      • Transition to different modes
      • Change the default issuer
      • Reissue PKI web certificates
    • Configure secret rotations
  • Administer
  • Control access
    • Connect to an identity provider
    • Sign in
    • Grant and revoke access
    • Role descriptions
    • Role definitions
    • Authenticate with service accounts
    • Secure service account keys
    • Manage Keycloak compliance
    • Recover device if identity provider is unavailable
  • Manage projects
    • Overview
    • Create a project
    • Manage projects and their resources
    • Delete a project
  • Store data
    • Overview
    • Install the storage CLI
    • Manage buckets
      • Create buckets
      • List and view buckets
      • Delete buckets
      • Set bucket retention periods
      • Grant and obtain bucket access
      • Create WORM buckets
    • Manage objects
      • Upload and download objects
      • List objects
      • Copy, modify, and move objects
      • Delete objects
    • Transfer data
    • Rotate storage credentials
      • Object storage keys
      • Disk encryption keys
      • Storage authentication keys and certificates
  • Encryption
    • Data encryption
    • Boot disk encryption
  • Monitor metrics and logs
    • Overview
    • Prepare IAM permissions
    • Collect and query metrics
      • Monitoring overview
      • Collect metrics
      • Query and view metrics
      • Encrypt metrics
      • Label metrics
      • Create metrics from metrics
      • Create dashboards
    • Collect and query logs
      • Logging overview
      • Collect logs
      • Set up central logs server
      • Export logs to a remote bucket
      • Query and view logs
      • Create metrics from logs
      • Secure and restore audit logs
    • Create and manage alerts
      • Alerting overview
      • Create alert rules
      • Configure notification channels
      • Query and view open alerts
      • Manage alerts and policies
    • Audit logs
      • Overview
      • Audited components
        • Overview
        • ADD
        • AIS
        • AR
        • ASM
        • CERT
        • DHCP
        • DNS
        • IAM
        • INV
        • LOG and AL
        • MKT
        • MON
        • ORG
        • OS
        • RM
        • SERV
        • Storage
        • VMM
        • UNET
      • Audit log sources
        • Overview
        • Artifact Management
        • Kubernetes
        • Observability audit logger
        • Service Mesh Envoy
    • Metrics
      • Overview
      • ADD
      • COM
      • DNS
      • INV
      • VMM
    • Visualization dashboards
      • Dashboards overview
      • Monitor health status
  • Manage networking
    • Networking overview
    • Control data exfiltration
    • Configure project network policies
      • Overview
      • Create intra-project traffic network policies
      • Create cross-project traffic network policies
    • View the virtual network
    • View NAT settings
    • Manage load balancers
      • Overview
      • Configure internal load balancers
      • Configure external load balancers
    • Manage outbound traffic from workloads
  • Manage internal network compliance
  • Update and patch device
  • Perform Nessus scans
  • Manage feature gates
  • Manage system artifacts
    • Registry overview
    • Learn about system limits
    • Modify system artifacts
    • Audit changes to artifacts
    • Push and pull a container image
    • Manage artifacts during an upgrade
      • Resize registry storage
      • Rotate package validation certificate
  • Troubleshoot the device
    • Networking
    • Observability
    • Software provisioning
    • Virtual machine
    • Device inaccessible
  • Shut down and power up the device
  • Shut down a blade
  • Package the device
  • Return device
    • Erase data
    • Return the device
  • Use the device
  • Overview
  • Control access to project resources
    • Sign in
    • Grant access to resources
    • Predefined role descriptions
    • Role definitions
    • Authenticate with service accounts
    • Secure service account keys
  • Deploy workloads
    • Deploy container workloads
      • Overview
      • Manage stateless workloads
        • Create stateless workloads
        • Inspect stateless workloads
        • Update stateless workloads
        • Scale stateless workloads
        • Delete stateless workloads
      • Manage stateful workloads
        • Create stateful workloads
        • Inspect stateful workloads
        • Update stateful workloads
        • Scale stateful workloads
        • Delete stateful workloads
      • Deploy GPU container workloads
      • Configure container storage
        • Access persistent storage
        • Create volume snapshots
      • Deploy a container app
    • Deploy virtual machine workloads
      • VMs overview
      • Prepare IAM permissions
      • Create VMs
        • Create and start a VM
        • Supported VM images
        • Create custom images
        • Create and manage Windows VMs
        • Import virtual disks
        • Manage VM boot disks
          • Create a boot disk
          • Replace a boot disk
        • Create a standalone disk
      • Connect to VMs
        • Connect to a VM
        • Transfer files
        • Enable IP addresses
        • Set network policies
      • Manage VMs
        • Manage VM lifecycles
        • Start and stop a VM
        • Minimize the VM start time
        • View VM properties
        • Update VM properties
        • View VM machine type
        • View and maintain VM metadata
        • Delete a VM
        • Securely boot a VM
        • Add a disk to a VM
        • Expand VM disks
      • Manage the OS
        • Manage guest environment
        • Manage OS packages
        • Use a startup script on Linux VMs
        • Use a startup script on Windows VMs
      • Monitor VM metrics
  • Deploy a deep learning container
  • Run Dataproc container for Spark
  • Create and manage Harbor resources
    • Overview
    • Create Harbor projects
    • Manage Harbor registry instances
    • Manage container images
      • Configure Docker to trust the Harbor root CA
      • Sign in to Docker and Helm
      • Push an image
      • Pull an image with Docker
    • Configure access control
    • Scan for vulnerabilities
    • Configure tag retention rules
  • Implement Vertex AI
  • Overview
  • Get started
    • Prepare IAM permissions
    • Set up a project
    • Provision GPUs and enable pre-trained APIs
    • View service status and endpoints
    • Install client libraries
    • Authenticate API requests
  • Optical Character Recognition
    • Learn about character recognition features
    • Set up a character recognition project
    • Detect text in images
    • Detect text in files
    • Supported languages
  • Speech-to-Text
    • Learn about speech recognition features
    • Set up a speech recognition project
    • Transcribe audio
    • Supported languages
  • Translation
    • Learn about translation features
    • Set up a translation project
    • Translate text
    • Supported languages
  • View Vertex AI logs and metrics
  • Security and compliance
  • Shared responsibility model
  • IL5 configuration
  • Home
  • Google Distributed Cloud Hosted Appliance
  • Documentation

Audit log sources
Stay organized with collections Save and categorize content based on your preferences.

This page contains information about the following original sources that capture audit logs:

  • Artifact Management audit logs
  • Kubernetes audit logs
  • Observability audit logger
  • Service Mesh Envoy access logs

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-07-18 UTC.

  • Why Google

    • Choosing Google Cloud
    • Trust and security
    • Modern Infrastructure Cloud
    • Multicloud
    • Global infrastructure
    • Customers and case studies
    • Analyst reports
    • Whitepapers
  • Products and pricing

    • See all products
    • See all solutions
    • Google Cloud for Startups
    • Google Cloud Marketplace
    • Google Cloud pricing
    • Contact sales
  • Support

    • Google Cloud Community
    • Support
    • Release Notes
    • System status
  • Resources

    • GitHub
    • Getting Started with Google Cloud
    • Google Cloud documentation
    • Code samples
    • Cloud Architecture Center
    • Training and Certification
    • Developer Center
  • Engage

    • Blog
    • Events
    • X (Twitter)
    • Google Cloud on YouTube
    • Google Cloud Tech on YouTube
    • Become a Partner
    • Google Cloud Affiliate Program
    • Press Corner
  • About Google
  • Privacy
  • Site terms
  • Google Cloud terms
  • Manage cookies
  • Our third decade of climate action: join us
  • Sign up for the Google Cloud newsletter Subscribe
  • English
  • Deutsch
  • Español – América Latina
  • Français
  • Indonesia
  • Italiano
  • Português – Brasil
  • 中文 – 简体
  • 中文 – 繁體
  • 日本語
  • 한국어