This document describes audit logging performed on Personalized Service Health. It describes which methods are audited and details about the audit log each method produces. It describes which methods generate audit logs and the content of each log. It also identifies methods that don't produce audit logs. Google Cloud generates audit logs that record administrative activities and access events within your Google Cloud resources. For more information, see Cloud Audit Logs overview.
Service name
Personalized Service Health audit logs use the service name servicehealth.googleapis.com
.
Methods by permission type
Methods that check DATA_READ
, DATA_WRITE
, and
ADMIN_READ
permissions generate logs categorized as
Data Access audit logs.
Methods that check ADMIN_WRITE
permissions generate logs
categorized as
Admin Activity audit logs.
Permission type | Methods |
---|---|
DATA_READ |
google.cloud.servicehealth.v1.ServiceHealth.GetEvent google.cloud.servicehealth.v1.ServiceHealth.GetOrganizationEvent google.cloud.servicehealth.v1.ServiceHealth.GetOrganizationImpact google.cloud.servicehealth.v1.ServiceHealth.ListEvents google.cloud.servicehealth.v1.ServiceHealth.ListOrganizationEvents google.cloud.servicehealth.v1.ServiceHealth.ListOrganizationImpacts |
Audit logs for each API interface
For more information about which permissions are evaluated for each method, see the Identity and Access Management documentation for Personalized Service Health.
google.cloud.servicehealth.v1.ServiceHealth
The following section contains details about audit logs associated with
methods belonging to google.cloud.servicehealth.v1.ServiceHealth
.
google.cloud.servicehealth.v1.ServiceHealth.GetEvent
- Method:
google.cloud.servicehealth.v1.ServiceHealth.GetEvent
- Audit log type: Data access
- Permissions:
servicehealth.events.get - DATA_READ
- Method is a long-running or streaming operation:
No.
- Filter for this method:
protoPayload.methodName="google.cloud.servicehealth.v1.ServiceHealth.GetEvent"
google.cloud.servicehealth.v1.ServiceHealth.GetOrganizationEvent
- Method:
google.cloud.servicehealth.v1.ServiceHealth.GetOrganizationEvent
- Audit log type: Data access
- Permissions:
servicehealth.organizationEvents.get - DATA_READ
- Method is a long-running or streaming operation:
No.
- Filter for this method:
protoPayload.methodName="google.cloud.servicehealth.v1.ServiceHealth.GetOrganizationEvent"
google.cloud.servicehealth.v1.ServiceHealth.GetOrganizationImpact
- Method:
google.cloud.servicehealth.v1.ServiceHealth.GetOrganizationImpact
- Audit log type: Data access
- Permissions:
servicehealth.organizationImpacts.get - DATA_READ
- Method is a long-running or streaming operation:
No.
- Filter for this method:
protoPayload.methodName="google.cloud.servicehealth.v1.ServiceHealth.GetOrganizationImpact"
google.cloud.servicehealth.v1.ServiceHealth.ListEvents
- Method:
google.cloud.servicehealth.v1.ServiceHealth.ListEvents
- Audit log type: Data access
- Permissions:
servicehealth.events.list - DATA_READ
- Method is a long-running or streaming operation:
No.
- Filter for this method:
protoPayload.methodName="google.cloud.servicehealth.v1.ServiceHealth.ListEvents"
google.cloud.servicehealth.v1.ServiceHealth.ListOrganizationEvents
- Method:
google.cloud.servicehealth.v1.ServiceHealth.ListOrganizationEvents
- Audit log type: Data access
- Permissions:
servicehealth.organizationEvents.list - DATA_READ
- Method is a long-running or streaming operation:
No.
- Filter for this method:
protoPayload.methodName="google.cloud.servicehealth.v1.ServiceHealth.ListOrganizationEvents"
google.cloud.servicehealth.v1.ServiceHealth.ListOrganizationImpacts
- Method:
google.cloud.servicehealth.v1.ServiceHealth.ListOrganizationImpacts
- Audit log type: Data access
- Permissions:
servicehealth.organizationImpacts.list - DATA_READ
- Method is a long-running or streaming operation:
No.
- Filter for this method:
protoPayload.methodName="google.cloud.servicehealth.v1.ServiceHealth.ListOrganizationImpacts"