Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Pencadangan memastikan bahwa log audit dipertahankan meskipun data asli hilang atau rusak, sehingga membantu memenuhi persyaratan dan memungkinkan Anda memulihkan informasi jika terjadi kegagalan sistem atau penghapusan yang tidak disengaja. Log audit yang dipulihkan memberikan
akses ke data historis, sehingga memungkinkan analisis peristiwa masa lalu, insiden keamanan,
dan aktivitas pengguna.
Menerapkan proses pencadangan dan pemulihan untuk log audit bermanfaat untuk mempertahankan integritas data, memastikan kepatuhan, dan memungkinkan analisis historis.
Anda dapat mengamankan log audit dari lingkungan air gap Google Distributed Cloud (GDC) di bucket cadangan jarak jauh untuk menyimpan dan memulihkan data jika diperlukan. Proses ini ditangani oleh Operator Infrastruktur (IO) yang menginstal dan mengonfigurasi komponen yang diperlukan untuk memulihkan log audit historis dari cadangan tersebut.
Mengidentifikasi bucket sumber
Anda harus mengidentifikasi bucket GDC sumber yang berisi log audit asli yang ingin Anda amankan.
Untuk mendapatkan izin yang diperlukan untuk melihat bucket log audit platform, minta Admin IAM Organisasi Anda untuk memberi Anda peran Audit Logs Platform Bucket Viewer (audit-logs-platform-bucket-viewer) di server Management API dalam namespace audit-logs-loki-pa-buckets.
Hubungi IO Anda untuk membuat cadangan dan memulihkan log audit
Untuk meminta proses pencadangan dan pemulihan log audit, hubungi Operator Infrastruktur (IO) Anda dan berikan endpoint bucket pencadangan dan kredensial aksesnya. Anda bertanggung jawab untuk memastikan IO mendapatkan izin ini atas permintaan.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[[["\u003cp\u003eBacking up audit logs is crucial for data preservation, compliance, and historical analysis in case of data loss or system failures.\u003c/p\u003e\n"],["\u003cp\u003eInfrastructure Operators (IOs) are responsible for the installation and configuration of backup and restore processes for audit logs from Google Distributed Cloud (GDC) air-gapped environments.\u003c/p\u003e\n"],["\u003cp\u003eYou need the \u003ccode\u003eaudit-logs-platform-bucket-viewer\u003c/code\u003e role to view platform audit log buckets, which is granted by the Organization IAM Admin in the Management API server.\u003c/p\u003e\n"],["\u003cp\u003eTo initiate a backup and restore process, you must identify the source bucket containing the audit logs and provide the IO with its name and endpoint, and ensure they have access credentials.\u003c/p\u003e\n"]]],[],null,["# Secure and restore audit logs\n\nBackups ensure that audit logs are preserved even if the original data is lost\nor corrupted, helping meet requirements and letting you recover information in\ncase of system failures or accidental deletions. Restored audit logs provide\naccess to historical data, enabling analysis of past events, security incidents,\nand user activity.\n\nImplementing a backup and restore process for audit logs is beneficial for\nmaintaining data integrity, ensuring compliance, and enabling historical\nanalysis.\n\nYou can secure audit logs from your Google Distributed Cloud (GDC) air-gapped environment\nin remote backup buckets to preserve and restore data when necessary. This\nprocess is handled by Infrastructure Operators (IOs) who install and configure\nthe necessary components to recover historical audit logs from those backups.\n\nIdentify the source bucket\n--------------------------\n\nYou must identify the source GDC bucket that contains\nthe original audit logs you want to secure.\n\nTo get the permissions you need to view platform audit logs buckets, ask your\nOrganization IAM Admin to grant you the Audit Logs Platform Bucket Viewer\n(`audit-logs-platform-bucket-viewer`) role in the Management API server in the\n`audit-logs-loki-pa-buckets` namespace.\n\nYou must share with the IO the name and endpoint of the bucket that contains the\nlogs you want to secure. To learn how to view bucket configurations, see\n[List and view storage bucket configurations](/distributed-cloud/hosted/docs/latest/gdch/platform/pa-user/list-view-storage-buckets).\n\nContact your IO to create a backup and restore audit logs\n---------------------------------------------------------\n\nTo request a backup and restore process for audit logs, contact your\nInfrastructure Operator (IO) and provide them with the backup bucket's endpoint\nand access credentials. You are responsible for ensuring the IO gets these\npermissions upon request.\n\nTo learn how to grant access, see [Grant and revoke access](/distributed-cloud/hosted/docs/latest/gdch/platform/pa-user/iam/set-up-role-bindings)."]]