[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Informações incorretas ou exemplo de código","incorrectInformationOrSampleCode","thumb-down"],["Não contém as informações/amostras de que eu preciso","missingTheInformationSamplesINeed","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-08-27 UTC."],[[["\u003cp\u003eThis page provides an example of a Data Access audit log entry generated when a write request is sent to Bigtable.\u003c/p\u003e\n"],["\u003cp\u003eThe log entry example demonstrates key fields such as \u003ccode\u003eauthenticationInfo\u003c/code\u003e, \u003ccode\u003erequestMetadata\u003c/code\u003e, and \u003ccode\u003eauthorizationInfo\u003c/code\u003e, among others, which are part of a typical Bigtable audit log.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003emethodName\u003c/code\u003e field, in this case, is \u003ccode\u003egoogle.bigtable.v2.Bigtable.MutateRow\u003c/code\u003e, indicating a mutation operation on a Bigtable row.\u003c/p\u003e\n"],["\u003cp\u003eThe example log shows the \u003ccode\u003eresourceName\u003c/code\u003e and \u003ccode\u003etableName\u003c/code\u003e, helping to identify the specific table, instance, and project that the operation targeted.\u003c/p\u003e\n"],["\u003cp\u003eThe log contains data that can be used to track user actions such as the caller's IP address, user agent, timestamp, as well as information regarding the type of request made.\u003c/p\u003e\n"]]],[],null,["# Audit log example\n=================\n\nThis page shows an example of a Data Access audit log entry that is generated\nwhen you send a [write request](/bigtable/docs/writes) to Bigtable. For more\ndetails about audit log entries, see [Understanding audit logs](/logging/docs/audit/understanding-audit-logs). For a list of Bigtable fields that are\nlogged, see [Audit log fields](/bigtable/docs/audit-log-fields).\n\nFor brevity, some parts of the log entry are omitted, and some fields are\nhighlighted for emphasis.\n\n\u003cbr /\u003e\n\n```json\n {\n protoPayload: {\n @type: \"type.googleapis.com/google.cloud.audit.AuditLog\",\n status: {},\n authenticationInfo: {\n principalEmail: \"user@example.com\",\n serviceAccountDelegationInfo: [\n {\n firstPartyPrincipal: {\n principalEmail: \"service-123@compute-system.iam.gserviceaccount.com\"\n }\n }\n ],\n principalSubject\": \"serviceAccount:123-compute@developer.gserviceaccount.com\"\n },\n requestMetadata: {\n callerIp: \"12.586.9.1\",\n callerSuppliedUserAgent: \"bigtable-1.4.0,jdk-1.8,hbase-1.4.7 grpc-java-netty/1.10.1,gzip(gfe)\",\n requestAttributes: {\n time: \"2020-12-10T03:22:59.373508362Z\",\n auth: {}\n },\n destinationAttributes: {}\n },\n serviceName: \"bigtable.googleapis.com\",\n methodName: \"google.bigtable.v2.Bigtable.MutateRow\",\n authorizationInfo: [\n {\n resource: \"projects/test-project/instances/test-instance/tables/test-table\",\n permission: \"bigtable.tables.mutateRows\",\n granted: true,\n resourceAttributes: {}\n }\n ],\n resourceName: \"projects/test-project/instances/test-instance/tables/test-table\",\n request: {\n mutations: [\n {\n setCell: {\n familyName: \"cf1\",\n }\n }\n ],\n tableName: \"projects/test-project/instances/test-instance/tables/test-table\",\n @type: \"type.googleapis.com/google.bigtable.v2.MutateRowRequest\",\n rowKey: \"cm93LWtleQ==\"\n },\n },\n insertId: \"1wt6rdna0\",\n resource: {\n type: \"audited_resource\",\n labels: {\n service: \"bigtable.googleapis.com\",\n project_id: \"test-project\",\n method: \"google.bigtable.v2.Bigtable.MutateRow\"\n }\n },\n timestamp: \"2019-05-27T16:24:56.135Z\",\n severity: \"NOTICE\",\n logName: \"projects/test-project/logs/cloudaudit.googleapis.com%2Fdata_access\",\n receiveTimestamp: \"2020-05-27T04:56:47.427539594Z\"\n }\n```\n\n\u003cbr /\u003e"]]