Google Cloud Cloud/Key activity logging











up vote
1
down vote

favorite












I have just recently started to work with Google Cloud and I am trying to wrap my head around some of its inner workings, mainly the audit logging part.



What I want do is get the log activity from when my keys are used for anything and also when someone actually logged into the Google Console Cloud (it could be the Key Vault or the Key Ring, too).



I have been using power shell to extract these logs using gcloud read logging and this is where I start to doubt whether I have the right place. I will explain:



I have created new keys and I see in the Activity Panel this action, and I can already extract this through gcloud read logging resource.type=cloudkms_cryptokey (there could be a typo on the command line, since I am writing it from the top of my head, sorry for that!).



Albeit I have this information, I am rather curious if this is the correct course of action here. I saw the CreateCryptoKey and SetIamPolicy methods on my logs, alright, but am I going to see all actions related to these keys? By reading the GCloud docs, I feel as though I am only getting some of the actions?



As I have said, I am trying to work my way around the GCloud Documentation, but it is such an overwhelming amount of information that I am not really getting the proper answer I am looking for, this is why I thought about resorting to this community.



So, to summarize, am I getting all the information related to my keys the way I am doing right now? And what about the people that have access to the Google Cloud Console page, is there a way to find who accessed it and which part (Crypto Keys page, Crypto Vault page for example)? That's something I have not understood from the docs as well, sadly. Perhaps someone could show me the proper page where I can make references to what I am looking for? Because the Cloud Audit Logging page doesn't feel totally clear to me on this front (and I assume I could be at fault here, these past weeks have been harsh!)



Thanks for anyone that takes some time to answer my question!










share|improve this question




























    up vote
    1
    down vote

    favorite












    I have just recently started to work with Google Cloud and I am trying to wrap my head around some of its inner workings, mainly the audit logging part.



    What I want do is get the log activity from when my keys are used for anything and also when someone actually logged into the Google Console Cloud (it could be the Key Vault or the Key Ring, too).



    I have been using power shell to extract these logs using gcloud read logging and this is where I start to doubt whether I have the right place. I will explain:



    I have created new keys and I see in the Activity Panel this action, and I can already extract this through gcloud read logging resource.type=cloudkms_cryptokey (there could be a typo on the command line, since I am writing it from the top of my head, sorry for that!).



    Albeit I have this information, I am rather curious if this is the correct course of action here. I saw the CreateCryptoKey and SetIamPolicy methods on my logs, alright, but am I going to see all actions related to these keys? By reading the GCloud docs, I feel as though I am only getting some of the actions?



    As I have said, I am trying to work my way around the GCloud Documentation, but it is such an overwhelming amount of information that I am not really getting the proper answer I am looking for, this is why I thought about resorting to this community.



    So, to summarize, am I getting all the information related to my keys the way I am doing right now? And what about the people that have access to the Google Cloud Console page, is there a way to find who accessed it and which part (Crypto Keys page, Crypto Vault page for example)? That's something I have not understood from the docs as well, sadly. Perhaps someone could show me the proper page where I can make references to what I am looking for? Because the Cloud Audit Logging page doesn't feel totally clear to me on this front (and I assume I could be at fault here, these past weeks have been harsh!)



    Thanks for anyone that takes some time to answer my question!










    share|improve this question


























      up vote
      1
      down vote

      favorite









      up vote
      1
      down vote

      favorite











      I have just recently started to work with Google Cloud and I am trying to wrap my head around some of its inner workings, mainly the audit logging part.



      What I want do is get the log activity from when my keys are used for anything and also when someone actually logged into the Google Console Cloud (it could be the Key Vault or the Key Ring, too).



      I have been using power shell to extract these logs using gcloud read logging and this is where I start to doubt whether I have the right place. I will explain:



      I have created new keys and I see in the Activity Panel this action, and I can already extract this through gcloud read logging resource.type=cloudkms_cryptokey (there could be a typo on the command line, since I am writing it from the top of my head, sorry for that!).



      Albeit I have this information, I am rather curious if this is the correct course of action here. I saw the CreateCryptoKey and SetIamPolicy methods on my logs, alright, but am I going to see all actions related to these keys? By reading the GCloud docs, I feel as though I am only getting some of the actions?



      As I have said, I am trying to work my way around the GCloud Documentation, but it is such an overwhelming amount of information that I am not really getting the proper answer I am looking for, this is why I thought about resorting to this community.



      So, to summarize, am I getting all the information related to my keys the way I am doing right now? And what about the people that have access to the Google Cloud Console page, is there a way to find who accessed it and which part (Crypto Keys page, Crypto Vault page for example)? That's something I have not understood from the docs as well, sadly. Perhaps someone could show me the proper page where I can make references to what I am looking for? Because the Cloud Audit Logging page doesn't feel totally clear to me on this front (and I assume I could be at fault here, these past weeks have been harsh!)



      Thanks for anyone that takes some time to answer my question!










      share|improve this question















      I have just recently started to work with Google Cloud and I am trying to wrap my head around some of its inner workings, mainly the audit logging part.



      What I want do is get the log activity from when my keys are used for anything and also when someone actually logged into the Google Console Cloud (it could be the Key Vault or the Key Ring, too).



      I have been using power shell to extract these logs using gcloud read logging and this is where I start to doubt whether I have the right place. I will explain:



      I have created new keys and I see in the Activity Panel this action, and I can already extract this through gcloud read logging resource.type=cloudkms_cryptokey (there could be a typo on the command line, since I am writing it from the top of my head, sorry for that!).



      Albeit I have this information, I am rather curious if this is the correct course of action here. I saw the CreateCryptoKey and SetIamPolicy methods on my logs, alright, but am I going to see all actions related to these keys? By reading the GCloud docs, I feel as though I am only getting some of the actions?



      As I have said, I am trying to work my way around the GCloud Documentation, but it is such an overwhelming amount of information that I am not really getting the proper answer I am looking for, this is why I thought about resorting to this community.



      So, to summarize, am I getting all the information related to my keys the way I am doing right now? And what about the people that have access to the Google Cloud Console page, is there a way to find who accessed it and which part (Crypto Keys page, Crypto Vault page for example)? That's something I have not understood from the docs as well, sadly. Perhaps someone could show me the proper page where I can make references to what I am looking for? Because the Cloud Audit Logging page doesn't feel totally clear to me on this front (and I assume I could be at fault here, these past weeks have been harsh!)



      Thanks for anyone that takes some time to answer my question!







      google-cloud-platform google-cloud-logging google-cloud-kms






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Nov 20 at 0:16

























      asked Nov 20 at 0:04









      Kazimirz

      63




      63
























          1 Answer
          1






          active

          oldest

          votes

















          up vote
          1
          down vote













          Admin activities such as creating a key or setting IAM policy are logged by default.



          Data access activities such as listing Cloud KMS resources (key rings, keys, etc.), or performing cryptographic operations (encryption, decryption, etc.) are not logged by default. You can enable data access logging, via the steps at https://cloud.google.com/kms/docs/logging. I'm not sure if that is the topic you are referring to, or https://cloud.google.com/logging/docs/audit/.






          share|improve this answer





















          • Hey Walter, thanks for the reply! I have seen these pages, but I will make sure to read 'em again with extreme attention. And to add a better summary, what I really want in the end is to have logs of what is going on within my GCloud account. Say that someone an user created a key. I can already see that since cloudkms_keyring extracts that information. Now, I want to know if someone just as much as visited the Key Rings page, or any other page. What is Encrypting/Decrypting might be good, yes, but it can come later, I am sure that is a lot of data and the logs can get quite heavy I take it.
            – Kazimirz
            Nov 20 at 11:25











          Your Answer






          StackExchange.ifUsing("editor", function () {
          StackExchange.using("externalEditor", function () {
          StackExchange.using("snippets", function () {
          StackExchange.snippets.init();
          });
          });
          }, "code-snippets");

          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "1"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });














          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53384382%2fgoogle-cloud-cloud-key-activity-logging%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes








          up vote
          1
          down vote













          Admin activities such as creating a key or setting IAM policy are logged by default.



          Data access activities such as listing Cloud KMS resources (key rings, keys, etc.), or performing cryptographic operations (encryption, decryption, etc.) are not logged by default. You can enable data access logging, via the steps at https://cloud.google.com/kms/docs/logging. I'm not sure if that is the topic you are referring to, or https://cloud.google.com/logging/docs/audit/.






          share|improve this answer





















          • Hey Walter, thanks for the reply! I have seen these pages, but I will make sure to read 'em again with extreme attention. And to add a better summary, what I really want in the end is to have logs of what is going on within my GCloud account. Say that someone an user created a key. I can already see that since cloudkms_keyring extracts that information. Now, I want to know if someone just as much as visited the Key Rings page, or any other page. What is Encrypting/Decrypting might be good, yes, but it can come later, I am sure that is a lot of data and the logs can get quite heavy I take it.
            – Kazimirz
            Nov 20 at 11:25















          up vote
          1
          down vote













          Admin activities such as creating a key or setting IAM policy are logged by default.



          Data access activities such as listing Cloud KMS resources (key rings, keys, etc.), or performing cryptographic operations (encryption, decryption, etc.) are not logged by default. You can enable data access logging, via the steps at https://cloud.google.com/kms/docs/logging. I'm not sure if that is the topic you are referring to, or https://cloud.google.com/logging/docs/audit/.






          share|improve this answer





















          • Hey Walter, thanks for the reply! I have seen these pages, but I will make sure to read 'em again with extreme attention. And to add a better summary, what I really want in the end is to have logs of what is going on within my GCloud account. Say that someone an user created a key. I can already see that since cloudkms_keyring extracts that information. Now, I want to know if someone just as much as visited the Key Rings page, or any other page. What is Encrypting/Decrypting might be good, yes, but it can come later, I am sure that is a lot of data and the logs can get quite heavy I take it.
            – Kazimirz
            Nov 20 at 11:25













          up vote
          1
          down vote










          up vote
          1
          down vote









          Admin activities such as creating a key or setting IAM policy are logged by default.



          Data access activities such as listing Cloud KMS resources (key rings, keys, etc.), or performing cryptographic operations (encryption, decryption, etc.) are not logged by default. You can enable data access logging, via the steps at https://cloud.google.com/kms/docs/logging. I'm not sure if that is the topic you are referring to, or https://cloud.google.com/logging/docs/audit/.






          share|improve this answer












          Admin activities such as creating a key or setting IAM policy are logged by default.



          Data access activities such as listing Cloud KMS resources (key rings, keys, etc.), or performing cryptographic operations (encryption, decryption, etc.) are not logged by default. You can enable data access logging, via the steps at https://cloud.google.com/kms/docs/logging. I'm not sure if that is the topic you are referring to, or https://cloud.google.com/logging/docs/audit/.







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Nov 20 at 0:41









          Walter Poupore

          375




          375












          • Hey Walter, thanks for the reply! I have seen these pages, but I will make sure to read 'em again with extreme attention. And to add a better summary, what I really want in the end is to have logs of what is going on within my GCloud account. Say that someone an user created a key. I can already see that since cloudkms_keyring extracts that information. Now, I want to know if someone just as much as visited the Key Rings page, or any other page. What is Encrypting/Decrypting might be good, yes, but it can come later, I am sure that is a lot of data and the logs can get quite heavy I take it.
            – Kazimirz
            Nov 20 at 11:25


















          • Hey Walter, thanks for the reply! I have seen these pages, but I will make sure to read 'em again with extreme attention. And to add a better summary, what I really want in the end is to have logs of what is going on within my GCloud account. Say that someone an user created a key. I can already see that since cloudkms_keyring extracts that information. Now, I want to know if someone just as much as visited the Key Rings page, or any other page. What is Encrypting/Decrypting might be good, yes, but it can come later, I am sure that is a lot of data and the logs can get quite heavy I take it.
            – Kazimirz
            Nov 20 at 11:25
















          Hey Walter, thanks for the reply! I have seen these pages, but I will make sure to read 'em again with extreme attention. And to add a better summary, what I really want in the end is to have logs of what is going on within my GCloud account. Say that someone an user created a key. I can already see that since cloudkms_keyring extracts that information. Now, I want to know if someone just as much as visited the Key Rings page, or any other page. What is Encrypting/Decrypting might be good, yes, but it can come later, I am sure that is a lot of data and the logs can get quite heavy I take it.
          – Kazimirz
          Nov 20 at 11:25




          Hey Walter, thanks for the reply! I have seen these pages, but I will make sure to read 'em again with extreme attention. And to add a better summary, what I really want in the end is to have logs of what is going on within my GCloud account. Say that someone an user created a key. I can already see that since cloudkms_keyring extracts that information. Now, I want to know if someone just as much as visited the Key Rings page, or any other page. What is Encrypting/Decrypting might be good, yes, but it can come later, I am sure that is a lot of data and the logs can get quite heavy I take it.
          – Kazimirz
          Nov 20 at 11:25


















          draft saved

          draft discarded




















































          Thanks for contributing an answer to Stack Overflow!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.





          Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


          Please pay close attention to the following guidance:


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53384382%2fgoogle-cloud-cloud-key-activity-logging%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          To store a contact into the json file from server.js file using a class in NodeJS

          Redirect URL with Chrome Remote Debugging Android Devices

          Dieringhausen