Creating a trail to upload audit logs
You can create a trail that will upload both management and data event audit logs into one of the destination objects:
- Yandex Object Storage bucket
- Yandex Cloud Logging group
- Yandex Data Streams data stream
Getting started
Depending on the selected destination object for logs, prepare the required infrastructure to create a trail:
-
Create a bucket with restricted access the audit logs will be uploaded to.
-
(Optional) Enable encryption for the bucket:
Make sure your account has the
kms.editor
role for the folder the bucket encryption key will be created in. -
Create a service account for the trail.
-
Assign roles to the service account for the trail to be able to collect and upload logs:
-
storage.uploader
for a bucket. -
kms.keys.encrypter
for a bucket encryption key.This role is only required if encryption has been enabled for the bucket.
-
audit-trails.viewer
for one of the resources that defines the required log collection scope:- Organization: To collect logs in selected clouds of the organization.
- Cloud: To collect logs in selected folders of the cloud.
- Folder: To collect logs in this folder.
Child resources inherit access permissions from their parent resources. For example, if a service account gets a role for a cloud, then the trail that uses this account will be able to collect logs for resources across all folders of this cloud. However, the trail will not be able to collect logs in other clouds owned by the organization: a role for the organization is required for that.
-
-
Make sure your account has the roles required for creating a trail:
- audit-trails.editor for the folder to host the trail.
- iam.serviceAccounts.user for the trail’s service account.
-
Create a log group the audit logs will be uploaded to.
-
Create a service account for the trail.
-
Assign roles to the service account for the trail to be able to collect and upload logs:
logging.writer
for a log group.
-
audit-trails.viewer
for one of the resources that defines the required log collection scope:- Organization: To collect logs in selected clouds of the organization.
- Cloud: To collect logs in selected folders of the cloud.
- Folder: To collect logs in this folder.
Child resources inherit access permissions from their parent resources. For example, if a service account gets a role for a cloud, then the trail that uses this account will be able to collect logs for resources across all folders of this cloud. However, the trail will not be able to collect logs in other clouds owned by the organization: a role for the organization is required for that.
-
Make sure your account has the roles required for creating a trail:
- audit-trails.editor for the folder to host the trail.
- iam.serviceAccounts.user for the trail’s service account.
-
Create a data stream the audit logs will be uploaded to.
-
Create a service account for the trail.
-
Assign roles to the service account for the trail to be able to collect and upload logs:
yds.editor
for a data stream.
-
audit-trails.viewer
for one of the resources that defines the required log collection scope:- Organization: To collect logs in selected clouds of the organization.
- Cloud: To collect logs in selected folders of the cloud.
- Folder: To collect logs in this folder.
Child resources inherit access permissions from their parent resources. For example, if a service account gets a role for a cloud, then the trail that uses this account will be able to collect logs for resources across all folders of this cloud. However, the trail will not be able to collect logs in other clouds owned by the organization: a role for the organization is required for that.
-
Make sure your account has the roles required for creating a trail:
- audit-trails.editor for the folder to host the trail.
- iam.serviceAccounts.user for the trail’s service account.
Creating a trail
-
In the management console
, select the folder to host the trail. -
Select Audit Trails.
-
Click Create trail.
-
Enter a trail name. It must be unique within the folder.
-
(Optional) Enter a description for your trail.
-
Under Destination, select one of the destination objects and specify its settings:
-
Object Storage: Uploading audit logs to the Object Storage bucket:
-
Bucket: Name of the bucket you created earlier.
-
Object prefix: Prefix that will be assigned to the objects with audit logs in the bucket. It is an optional parameter used in the full name of the audit log file.
Note
Use a prefix to store audit logs and third-party data in the same bucket. Do not use the same prefix for logs and other bucket objects because that may cause logs and third-party objects to overwrite each other.
-
Encryption key: Bucket encryption key. You only need to select it if encryption has been enabled for your bucket.
-
-
Cloud Logging: Specify the name of the log group you created earlier. Audit logs will be uploaded into it.
-
Data Streams: Specify the name of the data stream you created earlier. Audit logs will be uploaded into this stream.
-
-
Under Service account, select the previously created service account the trail will operate under.
-
Enable and configure event collection from one or two levels. Such events will end up in the audit logs.
To configure Collecting management events:
-
Select the log collection scope:
Organization
,Cloud
, orFolder
. The logged events will be collected in the scope you specify.The permissions of the service account created earlier must allow log collection from the specified scope.
-
Depending on the selected log collection scope, select specific clouds or folders to collect events from:
-
For the
Organization
collection scope, select from the Cloud drop-down list one or more clouds to collect events from.Keep the default value (
All
) to collect events from all clouds in the organization. -
For the
Cloud
collection scope, select from the Folder drop-down list one or more folders to collect events from.Keep the default value (
All
) to collect events from all folders in the cloud.
-
To configure Collecting data events:
-
Select one or more services to collect events from.
-
For each such service, select the log collection scope:
Organization
,Cloud
, orFolder
. The logged events will be collected in the scope you specify.The permissions of the service account created earlier must allow log collection from the specified scope.
-
Depending on the selected log collection scope, select specific clouds or folders to collect events from:
-
For the
Organization
collection scope, select from the Cloud drop-down list one or more clouds to collect events from.Keep the default value (
All
) to collect events from all clouds in the organization. -
For the
Cloud
collection scope, select from the Folder drop-down list one or more folders to collect events from.Keep the default value (
All
) to collect events from all folders in the cloud.
-
-
For each such service, select one of the following filters by events:
Receive all
: To collect all events within the service.Selected
: To collect only the selected events. Proceed to select the events.Exclude
: To collect all events except for the selected ones. Proceed to select the events.
-
If you do not have the Yandex Cloud CLI yet, install and initialize it.
The folder specified in the CLI profile is used by default. You can specify a different folder using the --folder-name
or --folder-id
parameters.
See the description of the CLI trail creation command for details about the arguments you can use:
yc audit-trails trail create --help
You can create a trail by specifying its parameters in one of these two ways:
In the YAML specification
Create a YAML specification containing the trail parameters and specify this file in the command to create the trail.
This method simplifies working with trail parameters and reduces error probability. In addition, you can only customize the registration of data events using the YAML specification.
-
Create a YAML file with the trail configuration:
name: <trail_name> folder_id: <folder_ID> destination: # Only one destination must be specified: # object_storage, cloud_logging, data_stream # Settings for all destinations are provided for illustration purposes. object_storage: bucket_id: <bucket_name> object_prefix: <prefix_for_objects> cloud_logging: log_group_id: <log_group_ID> data_stream: stream_name: <YDS_name> database_id: <YDS_database_ID> service_account_id: <service_account_ID> filtering_policy: management_events_filter: resource_scopes: - id: <cloud_or_folder_organization_ID> type: <type> data_events_filters: - service: <service_name> resource_scopes: - id: <cloud_or_folder_organization_ID> type: <type> # You can specify either `included_events` or `excluded_events`, or skip both parameters to collect all service events. # # Both parameters are provided for illustration purposes. included_events: event_types: - <these_events_will_be_collected> excluded_events: event_types: - <these_events_will_not_be_collected>
Where:
-
name
: Trail name. It must be unique within the folder. -
folder_id
: ID of the folder the trail will reside in. -
destination
: Settings of the selected destination the audit logs will be uploaded to.Warning
Destination settings are mutually exclusive. Using some settings makes it impossible to use others.
-
object_storage
: Uploading logs to a Yandex Object Storage bucket:-
bucket_id
: Name of the bucket you created earlier.You can request the name of the bucket with the list of buckets in the folder (the default folder is used):
yc storage bucket list
-
object_prefix
: Prefix that will be assigned to the objects with audit logs in the bucket. It is an optional parameter used in the full name of the audit log file.Note
Use a prefix to store audit logs and third-party data in the same bucket. Do not use the same prefix for logs and other bucket objects because that may cause logs and third-party objects to overwrite each other.
-
-
cloud_logging
: Uploading logs to a Yandex Cloud Logging group.In the
log_group_id
parameter, specify the ID of the log group you created earlier. You can request the ID with the list of log groups in the folder. -
data_stream
: Uploading logs to a data stream in Yandex Data Streams:stream_name
: Name of the data stream you created earlier. You can request the name with the list of data streams in the folder.database_id
: ID of the YDB database used by Data Streams. You can request the ID with the list of YDB databases in the folder.
-
-
service_account_id
: ID of the service account you created earlier.
-
filtering_policy
: Settings of the filtering policy that determines which events to collect and include in the audit logs. The policy consists of filters pertaining to different levels of events.Warning
You must configure at least one filter for the policy; otherwise, you will not be able to create a trail.
Available filters:
-
management_events_filter
: Management event filter.Specify the log collection scope in the
resource_scopes
parameter:-
id
: Organization, cloud, or folder ID. -
type
: Scope type according to the specified ID:organization-manager.organization
: Organization.resource-manager.cloud
: Cloud.resource-manager.folder
: Folder.
You can combine several scopes belonging to the same organization in one
resource_scopes
parameter. For example, you can collect logs from one entire cloud and only from particular folders in another cloud:resource_scopes: # Collecting logs from all of cloud 1 - id: <ID_of_cloud_1> type: resource-manager.cloud # Collecting logs from folder 1 of cloud 2 - id: <folder_1_ID> type: resource-manager.folder # Collecting logs from folder 2 of cloud 2 - id: <folder_2_ID> type: resource-manager.folder
Service account permissions must allow collecting logs from the specified scopes.
-
-
data_events_filters
: Data event filters. You can configure several filters of this type, one filter per service.A filter for one service has the following structure:
-
service
: Service name. You can get it from the data event reference. -
resource_scopes
: Places to collect data events from. You can configure this parameter the same way as the management event filter. -
*_events
: Data event filters.included_events.event_types
: Collect only specified events.excluded_events.event_types
: Collect all events other than the specified ones.
You can get a list of events from the data event reference.
Warning
The
included_events
andexcluded_events
filters are mutually exclusive, so only one of them should be set up. If neither filter is set up, all events will be collected.
-
-
-
-
Run this command:
yc audit-trails trail create --file <file_path>
In the command arguments:
Use this method if your trail configuration is simple and contains few parameters.
Note
You can only customize the registration of data events using the YAML specification.
Run this command:
yc audit-trails trail create \
--name <trail_name> \
--description <trail_description> \
--labels <label_list> \
--service-account-id <service_account_ID> \
--destination-bucket <bucket_name> \
--destination-bucket-object-prefix <prefix_for_objects> \
--destination-log-group-id <log_group_ID> \
--destination-yds-stream <YDS_name> \
--destination-yds-database-id <YDS_database_ID> \
--filter-all-folder-id <folder_ID> \
--filter-all-cloud-id <cloud_ID> \
--filter-all-organisation-id <organization_ID> \
--filter-some-folder-ids <cloud_folder_list> \
--filter-from-cloud-id <cloud_ID_with_selected_folders> \
--filter-some-cloud-ids <list_of_clouds_in_organization> \
--filter-from-organisation-id <organization_ID_with_selected_clouds>
Where:
--name
: Name of the new trail.
-
--description
: Trail description. This is an optional parameter. -
--labels
: List of labels. This is an optional parameter. You can specify one or more labels separated by commas in<key1>=<value1>,<key2>=<value2>
format. -
--service-account-id
: Service account ID. -
--destination-bucket
: Name of the Yandex Object Storage bucket you want to upload audit logs to.You cannot use this parameter together with
--destination-log-group-id
or--destination-yds-stream
. -
--destination-bucket-object-prefix
: Prefix that will be assigned to the objects with audit logs in the bucket. It is an optional parameter used in the full name of the audit log file.Note
Use a prefix to store audit logs and third-party data in the same bucket. Do not use the same prefix for logs and other bucket objects because that may cause logs and third-party objects to overwrite each other.
-
--destination-log-group-id
: ID of the Yandex Cloud Logging log group the audit logs will be uploaded to.You cannot use this parameter together with
--destination-bucket
or--destination-yds-stream
. -
--destination-yds-stream
: Name of the Yandex Data Streams data stream the audit logs will be uploaded to.You cannot use this parameter together with
--destination-bucket
or--destination-log-group-id
. -
--destination-yds-database-id
: ID of the YDB database used by Data Streams. -
--filter-all-folder-id
: Folder ID. The system will be logging management events for all resources in this folder. -
--filter-all-cloud-id
: Cloud ID. The system will be logging management events for all resources in this cloud. -
--filter-all-organisation-id
: Organization ID. The system will be logging management events for all resources in this organization. -
--filter-some-folder-ids
: List of folder IDs. The system will be logging management events for all resources in those folders, in the cloud specified in--filter-from-cloud-id
.This parameter can only be used together with
--filter-from-cloud-id
. -
--filter-from-cloud-id
: ID of the cloud housing the folders specified in the--filter-some-folder-ids
parameter.This parameter can only be used together with
--filter-some-folder-ids
. -
--filter-some-cloud-ids
: List of cloud IDs. The system will be logging management events for all resources in those clouds, in the organization specified in--filter-from-organisation-id
.This parameter can only be used together with
--filter-from-organisation-id
. -
--filter-from-organisation-id
: ID of the organization housing the clouds specified under--filter-some-folder-ids
.This parameter can only be used together with
--filter-some-cloud-ids
.
With Terraform
Terraform is distributed under the Business Source License
For more information about the provider resources, see the documentation on the Terraform
If you don't have Terraform, install it and configure the Yandex Cloud provider.
-
In the configuration file, describe the parameters of the trail to collect audit logs:
resource "yandex_audit_trails_trail" "basic_trail" { name = "<trail_name>" folder_id = "<folder_ID>" description = "<trail_description>" labels = { key = "value" } service_account_id = "<service_account_ID>" # Only one destination must be specified: # storage_destination , logging_destination, data_stream_destination # Settings for all destinations are provided for illustration purposes. logging_destination { log_group_id = "<log_group_ID>" } storage_destination { bucket_name = "<bucket_ID>" object_prefix = "<prefix>" } data_stream_destination { database_id = "<YDS_database_ID>" stream_name = "<YDS_name>" } # Filtering policy settings filtering_policy { management_events_filter { resource_scope { resource_id = "<organization_ID>" resource_type = "resource-manager.organization" } } data_events_filter { service = "<service>" included_events = ["<service_event_type>","<service_2_event_type>"] resource_scope { resource_id = "<cloud_ID>" resource_type = "resource-manager.cloud" } resource_scope { resource_id = "<folder_ID>" resource_type = "resource-manager.folder" } } data_events_filter { service = "<service_2>" resource_scope { resource_id = "<ID_of_cloud_2>" resource_type = "resource-manager.cloud" } resource_scope { resource_id = "<cloud_3_ID>" resource_type = "resource-manager.cloud" } } data_events_filter { service = "<service_3>" resource_scope { resource_id = "<folder_2_ID>" resource_type = "resource-manager.folder" } resource_scope { resource_id = "<folder_3_ID>" resource_type = "resource-manager.folder" } } } }
Where:
-
name
: Name of the new trail. The naming requirements are as follows:- It must be 2 to 63 characters long.
- It may contain lowercase Latin letters, numbers, and hyphens.
- It must start with a letter and cannot end with a hyphen.
-
folder_id
: ID of the folder to create the trail in. -
description
: Description of the trail to distinguish it from other trails, e.g.,My very first trail
. This is an optional parameter. -
labels
: List of labels inkey=value
format. This is an optional parameter. -
service_account_id
: ID of the service account the trail will use to upload audit log files to the bucket.Based on the audit log collection scope, the service account must have the
audit-trails.viewer
role for the organization, cloud, or folder whose audit logs the trail will collect.
Warning
Only one destination must be specified:
storage_destination
,logging_destination
, ordata_stream_destination
.-
logging_destination
: Uploading logs to a Yandex Cloud Logging group.log_group_id
: ID of the log group for the trail to save audit logs to.
-
storage_destination
: Uploading logs to a Yandex Object Storage bucket:-
log_group_id
: Name of the bucket for the trail to save audit logs to. -
object_prefix
: Prefix that will be assigned to the objects with audit logs in the bucket. It is an optional parameter used in the full name of the audit log file.Note
Use a prefix to store audit logs and third-party data in the same bucket. Do not use the same prefix for logs and other bucket objects because that may cause logs and third-party objects to overwrite each other.
-
-
data_stream_destination
: Uploading logs to a data stream in Yandex Data Streams:stream_name
: Name of the data stream for the trail to save audit logs to.database_id
: ID of the Yandex Managed Service for YDB database used by Data Streams.
-
filtering_policy
: Settings of the filtering policy that determines which events to collect and include in the audit logs. The policy consists of filters pertaining to different levels of events. It contains themanagement_events_filter
anddata_events_filters
objects.-
management_events_filter
: Management event filter. -
resource_scopes
: Log collection scope. You can combine several scopes belonging to the same organization in oneresource_scopes
parameter. For example, you can collect logs from one entire cloud and only from particular folders in another cloud. Service account permissions must allow collecting logs from the specified scopes.-
resource_id
: ID of the resource for whose resources audit logs will be collected. Based on the audit log collection scope, specify the organization ID or the cloud ID in this parameter. -
resource_type
: Scope type according to the specified ID:organization-manager.organization
: Organization.resource-manager.cloud
: Cloud.resource-manager.folder
: Folder.
-
-
data_events_filters
: Data event filters. You can configure several filters of this type, one filter per service. A filter for one service has the following structure:service
: Name of the service in which the trail will process events. You can get it from the data event reference.resource_scopes
: Places to collect data events from. You can configure this parameter the same way as the management event filter.included_events
: Collect only specified events. This is an optional parameter. If not specified, all events will be collected. To collect all events except the specified ones, replaceincluded_events
withexcluded_events
. These parameters are mutually exclusive.
You can get a full list of events from the data event reference.
-
For more information about the
yandex_audit_trails_trail
resource parameters in Terraform, see the provider documentation . -
-
Create the resources:
-
In the terminal, change to the folder where you edited the configuration file.
-
Make sure the configuration file is correct using the command:
terraform validate
If the configuration is correct, the following message is returned:
Success! The configuration is valid.
-
Run the command:
terraform plan
The terminal will display a list of resources with parameters. No changes are made at this step. If the configuration contains errors, Terraform will point them out.
-
Apply the configuration changes:
terraform apply
-
Confirm the changes: type
yes
in the terminal and press Enter.
Terraform will create all the required resources. You can check the new resources and their settings using the management console
or this CLI command:yc audit-trails trail get <trail_name>
-
Use the create REST API method for the Trail resource or the TrailService/Create gRPC API call.
The trail will be created and start uploading audit logs to the selected destination object.
When uploading to Cloud Logging, you may get duplicate events in a log group. To find duplicates, refer to the unique record ID, json_payload.event_id
.
Examples
Creating a trail with management and data event filters
Create a trail with the following parameters:
-
sample-trail-all-planes
: Trail name. -
folder0***
: ID of the folder the trail will reside in. -
Destination object: Object Storage bucket named
sample-logs-bucket
. -
The service account for the trail is the account with the
service0***
ID. -
Management event filter settings:
The log collection scope is the organization with the ID
org1***
. Logs will be collected from all clouds that belong to this organization. -
Data event filter settings:
-
For Managed Service for PostgreSQL, logs will be collected from the cloud with the ID
cloud1***
and the folder with the IDfolder1***
.All the events of the service will be collected except for the following:
yandex.cloud.audit.mdb.postgresql.CreateDatabase
yandex.cloud.audit.mdb.postgresql.UpdateDatabase
-
For Object Storage, logs will be collected from the clouds with the IDs
cloud2***
andcloud3***
.Only the following events will be collected:
yandex.cloud.audit.storage.ObjectCreate
yandex.cloud.audit.storage.ObjectUpdate
yandex.cloud.audit.storage.ObjectDelete
-
For Compute Cloud, logs will be collected from the folders with the IDs
folder2***
andfolder3***
.All service events of the service will be collected.
-
-
Create a YAML named
sample-trail-all-planes.yaml
with the trail configuration.sample-trail-all-planes.yaml
name: sample-trail-all-planes folder_id: folder0*** destination: object_storage: bucket_id: sample-logs-bucket service_account_id: service0*** filtering_policy: management_events_filter: resource_scopes: - id: org1*** type: organization-manager.organization data_events_filters: - service: mdb.postgresql resource_scopes: - id: cloud1*** type: resource-manager.cloud - id: folder1*** type: resource-manager.folder excluded_events: event_types: - yandex.cloud.audit.mdb.postgresql.CreateDatabase - yandex.cloud.audit.mdb.postgresql.UpdateDatabase - service: storage resource_scopes: - id: cloud2*** type: resource-manager.cloud - id: cloud3*** type: resource-manager.cloud included_events: event_types: - yandex.cloud.audit.storage.ObjectCreate - yandex.cloud.audit.storage.ObjectUpdate - yandex.cloud.audit.storage.ObjectDelete - service: compute resource_scopes: - id: folder2*** type: resource-manager.folder - id: folder3*** type: resource-manager.folder
-
Run this command:
yc audit-trails trail create --file sample-trail-all-planes.yaml
A trail will be created with the specified parameters.
-
In the Terraform configuration file, describe the parameters of the trail you want to create:
resource "yandex_audit_trails_trail" "basic_trail" { name = "sample-trail-all-planes" folder_id = "folder0***" service_account_id = "service0***" storage_destination { bucket_name = "sample-logs-bucket" } filtering_policy { management_events_filter { resource_scope { resource_id = "org1***" resource_type = "resource-manager.organization" } } data_events_filter { service = "mdb.postgresql" excluded_events = ["yandex.cloud.audit.mdb.postgresql.CreateDatabase","yandex.cloud.audit.mdb.postgresql.UpdateDatabase"] resource_scope { resource_id = "cloud1***" resource_type = "resource-manager.cloud" } resource_scope { resource_id = "folder1***" resource_type = "resource-manager.folder" } } data_events_filter { service = "storage" resource_scope { resource_id = "cloud2***" resource_type = "resource-manager.cloud" } resource_scope { resource_id = "cloud3***" resource_type = "resource-manager.cloud" } } data_events_filter { service = "compute" resource_scope { resource_id = "folder2***" resource_type = "resource-manager.folder" } resource_scope { resource_id = "folder3***" resource_type = "resource-manager.folder" } } } }
-
Create the resources:
-
In the terminal, change to the folder where you edited the configuration file.
-
Make sure the configuration file is correct using the command:
terraform validate
If the configuration is correct, the following message is returned:
Success! The configuration is valid.
-
Run the command:
terraform plan
The terminal will display a list of resources with parameters. No changes are made at this step. If the configuration contains errors, Terraform will point them out.
-
Apply the configuration changes:
terraform apply
-
Confirm the changes: type
yes
in the terminal and press Enter.
A trail will be created with the specified parameters. You can check the new trail using the management console
or this CLI command:yc audit-trails trail get sample-trail-all-planes
-
Use the create REST API method for the Trail resource.
To use the examples, install cURL
The example below is intended to be run in MacOS and Linux. To run it in Windows, see how to work with Bash in Microsoft Windows.
-
Get an IAM token for authentication with the API.
-
Save the token to a variable and run this command in the terminal:
export IAM_TOKEN=<IAM_token>
-
Create a file named
body.json
with the following request body and a description of the new trail:{ "folderId": "folder0**", "name": "sample-trail-all-planes", "description": "sample-trail", "destination": { "objectStorage": { "bucketId": "sample-logs-bucket" } }, "serviceAccountId": "service0***", "filteringPolicy": { "managementEventsFilter": { "resourceScopes": [ { "id": "org1***", "type": "resource-manager.organization" } ] }, "dataEventsFilters": [ { "service": "mdb.postgresql", "excludedEvents": { "eventTypes": [ "yandex.cloud.audit.mdb.postgresql.CreateDatabase" ,"yandex.cloud.audit.mdb.postgresql.UpdateDatabase" ] }, "resourceScopes": [ { "id": "cloud1***", "type": "resource-manager.cloud" }, { "id": "folder1***", "type": "resource-manager.folder" } ] }, { "service": "storage", "resourceScopes": [ { "id": "cloud2**", "type": "resource-manager.cloud" }, { "id": "cloud3**", "type": "resource-manager.cloud" } ] }, { "service": "compute", "resourceScopes": [ { "id": "folder2**", "type": "resource-manager.folder" }, { "id": "folder3**", "type": "resource-manager.folder" } ] } ] } }
-
Run this request in your terminal:
curl \ --request POST \ --header "Authorization: Bearer ${IAM_TOKEN}" \ --data "@<request_body_file>" \ https://audittrails.api.cloud.yandex.net/audit-trails/v1/trails
Where:
<request_body_file>
: Path to the previously created request body file (body.json
).
Result:
{ "done": true, "metadata": { "@type": "type.googleapis.com/yandex.cloud.audittrails.v1.CreateTrailMetadata", "trailId": "cnpvprd5pa66********" }, "id": "cnp9qb9g8ldb********", "description": "operation_create", "createdAt": "2025-02-20T07:06:18.547321903Z", "createdBy": "ajevfb0tjfts********", "modifiedAt": "2025-02-20T07:06:18.547321903Z" }
What's next
- Learn more about the audit log format.
- Find out about the procedure for uploading audit logs to SIEM.
- Learn how to search for events in audit logs.