Mantieni tutto organizzato con le raccolte
Salva e classifica i contenuti in base alle tue preferenze.
Audit logging di Cloud Service Mesh
Questo documento descrive l'audit logging per i servizi Google Cloud , che generano audit log che registrano le attività amministrative e di accesso all'interno delle risorse Google Cloud .
Per ulteriori informazioni sugli audit log di Cloud, consulta quanto segue:
Ogni autorizzazione IAM ha una proprietà type, il cui valore è un enum
che può essere uno dei quattro valori: ADMIN_READ, ADMIN_WRITE,
DATA_READ o DATA_WRITE. Quando chiami un metodo, viene generato un log di controllo la cui categoria dipende dalla proprietà type dell'autorizzazione richiesta per eseguire il metodo.
I metodi che richiedono un'autorizzazione IAM con il valore della proprietà type corrispondente a DATA_READ, DATA_WRITE o ADMIN_READ generano log di controllo Accesso ai dati.
I metodi che richiedono un'autorizzazione IAM con il valore della proprietà typeADMIN_WRITE generano
log di controllo Attività amministratore.
[[["Facile da capire","easyToUnderstand","thumb-up"],["Il problema è stato risolto","solvedMyProblem","thumb-up"],["Altra","otherUp","thumb-up"]],[["Difficile da capire","hardToUnderstand","thumb-down"],["Informazioni o codice di esempio errati","incorrectInformationOrSampleCode","thumb-down"],["Mancano le informazioni o gli esempi di cui ho bisogno","missingTheInformationSamplesINeed","thumb-down"],["Problema di traduzione","translationIssue","thumb-down"],["Altra","otherDown","thumb-down"]],["Ultimo aggiornamento 2025-09-04 UTC."],[],[],null,["# Cloud Service Mesh audit logging\n================================\n\nThis document describes audit logging for . Google Cloud services\ngenerate audit logs that record administrative and access activities within your Google Cloud resources.\nFor more information about Cloud Audit Logs, see the following:\n\n- [Types of audit logs](/logging/docs/audit#types)\n- [Audit log entry structure](/logging/docs/audit#audit_log_entry_structure)\n- [Storing and routing audit logs](/logging/docs/audit#storing_and_routing_audit_logs)\n- [Cloud Logging pricing summary](/stackdriver/pricing#logs-pricing-summary)\n- [Enable Data Access audit logs](/logging/docs/audit/configure-data-access)\n\n\u003cbr /\u003e\n\nService name\n------------\n\naudit logs use the service name `trafficdirector.googleapis.com`.\nFilter for this service: \n\n```gdscript\n protoPayload.serviceName=\"trafficdirector.googleapis.com\"\n \n```\n\n\u003cbr /\u003e\n\nMethods by permission type\n--------------------------\n\nEach IAM permission has a `type` property, whose value is an enum\nthat can be one of four values: `ADMIN_READ`, `ADMIN_WRITE`,\n`DATA_READ`, or `DATA_WRITE`. When you call a method,\ngenerates an audit log whose category is dependent on the\n`type` property of the permission required to perform the method.\n\nMethods that require an IAM permission with the `type` property value\nof `DATA_READ`, `DATA_WRITE`, or `ADMIN_READ` generate\n[Data Access](/logging/docs/audit#data-access) audit logs.\n\nMethods that require an IAM permission with the `type` property value\nof `ADMIN_WRITE` generate\n[Admin Activity](/logging/docs/audit#admin-activity) audit logs.\n\nAPI interface audit logs\n------------------------\n\nFor information about how and which permissions are evaluated for each method,\nsee the Identity and Access Management documentation for .\n\n### `envoy.service.discovery.v3.AggregatedDiscoveryService`\n\nThe following audit logs are associated with methods belonging to\n`envoy.service.discovery.v3.AggregatedDiscoveryService`.\n\n#### `DeltaAggregatedResources`\n\n- **Method** : `envoy.service.discovery.v3.AggregatedDiscoveryService.DeltaAggregatedResources` \n- **Audit log type** : [Data access](/logging/docs/audit#data-access) \n- **Permissions** :\n - `trafficdirector.networks.getConfigs - DATA_READ`\n- **Method is a long-running or streaming operation** : [**Streaming RPC**](/logging/docs/audit/understanding-audit-logs#streaming) \n- **Filter for this method** : `\n protoPayload.methodName=\"envoy.service.discovery.v3.AggregatedDiscoveryService.DeltaAggregatedResources\"\n ` \n\n#### `StreamAggregatedResources`\n\n- **Method** : `envoy.service.discovery.v3.AggregatedDiscoveryService.StreamAggregatedResources` \n- **Audit log type** : [Data access](/logging/docs/audit#data-access) \n- **Permissions** :\n - `trafficdirector.networks.getConfigs - DATA_READ`\n- **Method is a long-running or streaming operation** : [**Streaming RPC**](/logging/docs/audit/understanding-audit-logs#streaming) \n- **Filter for this method** : `\n protoPayload.methodName=\"envoy.service.discovery.v3.AggregatedDiscoveryService.StreamAggregatedResources\"\n ` \n\n### `envoy.service.load_stats.v3.LoadReportingService`\n\nThe following audit logs are associated with methods belonging to\n`envoy.service.load_stats.v3.LoadReportingService`.\n\n#### `StreamLoadStats`\n\n- **Method** : `envoy.service.load_stats.v3.LoadReportingService.StreamLoadStats` \n- **Audit log type** : [Data access](/logging/docs/audit#data-access) \n- **Permissions** :\n - `trafficdirector.networks.reportMetrics - DATA_WRITE`\n- **Method is a long-running or streaming operation** : [**Streaming RPC**](/logging/docs/audit/understanding-audit-logs#streaming) \n- **Filter for this method** : `\n protoPayload.methodName=\"envoy.service.load_stats.v3.LoadReportingService.StreamLoadStats\"\n ` \n\n### `envoy.service.status.v3.ClientStatusDiscoveryService`\n\nThe following audit logs are associated with methods belonging to\n`envoy.service.status.v3.ClientStatusDiscoveryService`.\n\n#### `StreamClientStatus`\n\n- **Method** : `envoy.service.status.v3.ClientStatusDiscoveryService.StreamClientStatus` \n- **Audit log type** : [Data access](/logging/docs/audit#data-access) \n- **Permissions** :\n - `trafficdirector.networks.getConfigs - DATA_READ`\n- **Method is a long-running or streaming operation** : [**Streaming RPC**](/logging/docs/audit/understanding-audit-logs#streaming) \n- **Filter for this method** : `\n protoPayload.methodName=\"envoy.service.status.v3.ClientStatusDiscoveryService.StreamClientStatus\"\n `"]]