Cloud Bigtable API audit logging
This document describes audit logging for Cloud Bigtable API. Google Cloud servicesgenerate audit logs that record administrative and access activities within your Google Cloud resources.For more information about Cloud Audit Logs, see the following:
- Types of audit logs
- Audit log entry structure
- Storing and routing audit logs
- Cloud Logging pricing summary
- Enable Data Access audit logs
Notes
When a log entry exceeds thesize limit, Cloud Logging splits that entry and distributes the data across several entries. To learn how to identify and reassemble split audit logs, seeSplit audit log entries.
Service name
Cloud Bigtable API audit logs use the service namebigtable.googleapis.com.Filter for this service:
protoPayload.serviceName="bigtable.googleapis.com"
Methods by permission type
For details about which fields are logged for Data Access audit logging, seeAudit log fields. Before you enable Data Access audit logging, readManaging Costs. Each IAM permission has atype property, whose value is an enumthat can be one of four values:ADMIN_READ,ADMIN_WRITE,DATA_READ, orDATA_WRITE. When you call a method,Cloud Bigtable API generates an audit log whose category is dependent on thetype property of the permission required to perform the method.Methods that require an IAM permission with thetype property valueofDATA_READ,DATA_WRITE, orADMIN_READ generateData Access audit logs.Methods that require an IAM permission with thetype property valueofADMIN_WRITE generateAdmin Activity audit logs.
| Permission type | Methods |
|---|---|
ADMIN_READ | google.bigtable.v2.Bigtable.PingAndWarm |
DATA_READ | google.bigtable.v2.Bigtable.ExecuteQuerygoogle.bigtable.v2.Bigtable.GenerateInitialChangeStreamPartitionsgoogle.bigtable.v2.Bigtable.PrepareQuerygoogle.bigtable.v2.Bigtable.ReadChangeStreamgoogle.bigtable.v2.Bigtable.ReadModifyWriteRowgoogle.bigtable.v2.Bigtable.ReadRowsgoogle.bigtable.v2.Bigtable.SampleRowKeys |
DATA_WRITE | google.bigtable.v2.Bigtable.CheckAndMutateRowgoogle.bigtable.v2.Bigtable.MutateRowgoogle.bigtable.v2.Bigtable.MutateRowsgoogle.bigtable.v2.Bigtable.ReadModifyWriteRow |
API interface audit logs
For information about how and which permissions are evaluated for each method,see the Identity and Access Management documentation for Cloud Bigtable API.
google.bigtable.v2.Bigtable
The following audit logs are associated with methods belonging togoogle.bigtable.v2.Bigtable.
CheckAndMutateRow
- Method:
google.bigtable.v2.Bigtable.CheckAndMutateRow - Audit log type:Data access
- Permissions:
bigtable.tables.mutateRows - DATA_WRITE
- Method is a long-running or streaming operation:No.
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.CheckAndMutateRow"
ExecuteQuery
- Method:
google.bigtable.v2.Bigtable.ExecuteQuery - Audit log type:Data access
- Permissions:
bigtable.instances.executeQuery - DATA_READbigtable.tables.readRows - DATA_READ
- Method is a long-running or streaming operation:Streaming RPC
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.ExecuteQuery"
GenerateInitialChangeStreamPartitions
- Method:
google.bigtable.v2.Bigtable.GenerateInitialChangeStreamPartitions - Audit log type:Data access
- Permissions:
bigtable.tables.readRows - DATA_READ
- Method is a long-running or streaming operation:Streaming RPC
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.GenerateInitialChangeStreamPartitions"
MutateRow
- Method:
google.bigtable.v2.Bigtable.MutateRow - Audit log type:Data access
- Permissions:
bigtable.tables.mutateRows - DATA_WRITE
- Method is a long-running or streaming operation:No.
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.MutateRow"
MutateRows
- Method:
google.bigtable.v2.Bigtable.MutateRows - Audit log type:Data access
- Permissions:
bigtable.tables.mutateRows - DATA_WRITE
- Method is a long-running or streaming operation:Streaming RPC
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.MutateRows"
PingAndWarm
- Method:
google.bigtable.v2.Bigtable.PingAndWarm - Audit log type:Data access
- Permissions:
bigtable.instances.ping - ADMIN_READ
- Method is a long-running or streaming operation:No.
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.PingAndWarm"
PrepareQuery
- Method:
google.bigtable.v2.Bigtable.PrepareQuery - Audit log type:Data access
- Permissions:
bigtable.instances.executeQuery - DATA_READ
- Method is a long-running or streaming operation:No.
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.PrepareQuery"
ReadChangeStream
- Method:
google.bigtable.v2.Bigtable.ReadChangeStream - Audit log type:Data access
- Permissions:
bigtable.tables.readRows - DATA_READ
- Method is a long-running or streaming operation:Streaming RPC
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.ReadChangeStream"
ReadModifyWriteRow
- Method:
google.bigtable.v2.Bigtable.ReadModifyWriteRow - Audit log type:Data access
- Permissions:
bigtable.tables.mutateRows - DATA_WRITEbigtable.tables.readRows - DATA_READ
- Method is a long-running or streaming operation:No.
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.ReadModifyWriteRow"
ReadRows
- Method:
google.bigtable.v2.Bigtable.ReadRows - Audit log type:Data access
- Permissions:
bigtable.tables.readRows - DATA_READ
- Method is a long-running or streaming operation:Streaming RPC
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.ReadRows"
SampleRowKeys
- Method:
google.bigtable.v2.Bigtable.SampleRowKeys - Audit log type:Data access
- Permissions:
bigtable.tables.sampleRowKeys - DATA_READ
- Method is a long-running or streaming operation:Streaming RPC
- Filter for this method:
protoPayload.methodName="google.bigtable.v2.Bigtable.SampleRowKeys"
Methods that don't produce audit logs
A method might not produce audit logs for one or more of the followingreasons:
- It is a high volume method involving significant log generation and storage costs.
- It has low auditing value.
- Another audit or platform log already provides method coverage.
The following methods don't produce audit logs:
grpc.lookup.v1.RouteLookupService.RouteLookup
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-02-19 UTC.