This sample shows how to Configure a CloudAuditLogsSource
resource to
read data from Cloud Audit Logs and directly publish to the underlying transport (Pub/Sub),
in CloudEvents format.
-
Enable the
Cloud Audit Logs API
on your project:gcloud services enable logging.googleapis.com gcloud services enable stackdriver.googleapis.com
-
Create a
CloudAuditLogsSource
. ThisCloudAuditLogsSource
will emit Cloud Audit Log Entries for the creation of Pub/Sub topics.
You can change theserviceName
,methodName
andresourceName
(see detailed description here) to select the Cloud Audit Log Entries you want to view.CloudAuditLogsSource Spec Audit Log Entry Fields serviceName protoPayload.serviceName methodName protoPayload.methodName resourceName protoPayload.resourceName kubectl apply --filename cloudauditlogssource.yaml
-
Create a
Service
that the CloudAuditLogsSource will sink into:kubectl apply --filename event-display.yaml
Create a GCP PubSub Topic:
gcloud pubsub topics create test-auditlogs-source
We will verify that the published event was sent by looking at the logs of the service that this CloudAuditLogsSource sinks to.
-
We need to wait for the downstream pods to get started and receive our event, wait 60 seconds.
-
You can check the status of the downstream pods with:
kubectl get pods --selector app=event-display
You should see at least one.
-
-
Inspect the logs of the service:
kubectl logs --selector app=event-display -c user-container --tail=200
You should see log lines similar to:
☁️ cloudevents.Event
Validation: valid
Context Attributes,
specversion: 1.0
type: com.google.cloud.auditlog.event
source: pubsub.googleapis.com/projects/test
subject: projects/test/topics/test-auditlogs-source
id: efdb9bf7d6fdfc922352530c1ba51242
time: 2020-01-07T20:56:30.516179081Z
dataschema: type.googleapis.com/google.logging.v2.LogEntry
datacontenttype: application/json
Extensions,
methodname: google.pubsub.v1.Publisher.CreateTopic
resourcename: projects/test/topics/test-auditlogs-source
servicename: pubsub.googleapis.com
Data,
{
"insertId": "8c2iznd54od",
"logName": "projects/test/logs/cloudaudit.googleapis.com%2Factivity",
"protoPayload": {
"@type": "type.googleapis.com/google.cloud.audit.AuditLog",
"authenticationInfo": {
"principalEmail": "test@google.com"
},
"authorizationInfo": [
{
"granted": true,
"permission": "pubsub.topics.create",
"resource": "projects/test",
"resourceAttributes": {}
}
],
"methodName": "google.pubsub.v1.Publisher.CreateTopic",
"request": {
"@type": "type.googleapis.com/google.pubsub.v1.Topic",
"kmsKeyName": "",
"name": "projects/test/topics/test-auditlogs-source"
},
"requestMetadata": {
"callerIp": "2620:15c:10f:203:c404:c29d:a94d:dc1e",
"callerSuppliedUserAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36,gzip(gfe)",
"destinationAttributes": {},
"requestAttributes": {
"auth": {},
"time": "2020-01-07T20:56:30.520970037Z"
}
},
"resourceLocation": {
"currentLocations": [
"us-west2"
]
},
"resourceName": "projects/test/topics/test-auditlogs-source",
"response": {
"@type": "type.googleapis.com/google.pubsub.v1.Topic",
"messageStoragePolicy": {
"us-west2"
]
},
"name": "projects/test/topics/test-auditlogs-source"
},
"serviceName": "pubsub.googleapis.com"
},
"receiveTimestamp": "2020-01-07T20:56:59.919268372Z",
"resource": {
"labels": {
"project_id": "test",
"topic_id": "projects/test/topics/test-auditlogs-source"
},
"type": "pubsub_topic"
},
"severity": "NOTICE",
"timestamp": "2020-01-07T20:56:30.516179081Z"
}
- For integrating with Cloud Pub/Sub, see the PubSub example.
- For integrating with Cloud Storage see the Storage example.
- For integrating with Cloud Scheduler see the Scheduler example.
- For more information about CloudEvents, see the HTTP transport bindings documentation.
-
Delete the
CloudAuditLogsSource
kubectl delete -f ./cloudauditlogssource.yaml
-
Delete the
Service
kubectl delete -f ./event-display.yaml