Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Tindakan sensitif selalu ditulis ke
log platform Layanan Tindakan Sensitif.
Selain itu, Google Cloud memberikan ringkasan tindakan sensitif melalui
Notifikasi Saran.
Link untuk melihat tiga tindakan individual pertama dari setiap jenis di log platform disediakan dalam notifikasi. Anda memerlukan
peran Identity and Access Management yang sesuai, seperti
roles/logs.viewer, untuk dapat melihat log Cloud Logging.
Jika ada lebih dari tiga tindakan sensitif dari jenis tertentu, notifikasi juga dapat memberikan link untuk melihat semua tindakan di Logging. Namun, link ini tidak disediakan dalam semua kasus. Beberapa tindakan sensitif, seperti menambahkan kunci SSH tingkat project, dapat terjadi di beberapa project berbeda di organisasi Anda. Dalam hal ini, Google tidak dapat memberi Anda satu link Logging untuk melihat semua tindakan sensitif, karena Logging selalu dicakup ke resource tertentu (project, folder, atau organisasi).
Melihat semua log Tindakan Sensitif di organisasi
Jika ingin melihat semua log Tindakan Sensitif di organisasi Anda, Anda dapat
menyiapkan bucket Logging untuk
menggabungkan log ini.
Gunakan kueri berikut untuk menyertakan semua log Tindakan Sensitif dalam bucket:
logName:sensitiveaction.googleapis.com%2Faction
Anda dapat menambahkan istilah lain jika hanya menginginkan jenis log Tindakan Sensitif tertentu, seperti AND "add_ssh_key".
Menyiapkan pemberitahuan untuk log Tindakan Sensitif
Jika ingin mendapatkan pemberitahuan yang lebih sering tentang tindakan sensitif, Anda dapat mengonfigurasi pemberitahuan berbasis log. Misalnya, gunakan kueri berikut untuk mencocokkan semua log Tindakan Sensitif:
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-03 UTC."],[[["\u003cp\u003ePre-GA features are subject to the "Pre-GA Offerings Terms," are provided "as is," and may have limited support.\u003c/p\u003e\n"],["\u003cp\u003eSensitive actions are always logged in the Sensitive Actions Service platform logs and summarized in Advisory Notifications by Google Cloud.\u003c/p\u003e\n"],["\u003cp\u003eAdvisory Notifications may provide links to view the first three sensitive actions in platform logs, requiring an appropriate Identity and Access Management role.\u003c/p\u003e\n"],["\u003cp\u003eTo view all Sensitive Actions logs in your organization, you can set up a Logging bucket using the provided query: \u003ccode\u003elogName:sensitiveaction.googleapis.com%2Faction\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eYou can configure log-based alerts to receive frequent notifications about sensitive actions using the query: \u003ccode\u003elogName:sensitiveaction.googleapis.com%2Faction\u003c/code\u003e.\u003c/p\u003e\n"]]],[],null,["# Work with Sensitive Actions logs\n\n| **Preview**\n|\n|\n| This feature is subject to the \"Pre-GA Offerings Terms\" in the General Service Terms section\n| of the [Service Specific Terms](/terms/service-terms#1).\n|\n| Pre-GA features are available \"as is\" and might have limited support.\n|\n| For more information, see the\n| [launch stage descriptions](/products#product-launch-stages).\n\nSensitive actions are always written to\n[Sensitive Actions Service platform logs](/logging/docs/api/platform-logs#sensitive_actions_service).\nAdditionally, Google Cloud provides a summary of sensitive actions through\nAdvisory Notifications.\n\nLinks to view the first three individual actions of each type in the platform\nlogs are provided in the notification. You need an appropriate\n[Identity and Access Management role](/logging/docs/access-control#considerations), such as\n`roles/logs.viewer`, to be able to view Cloud Logging logs.\n\nIf there are more than three sensitive actions of a particular type, the\nnotification might also provide a link to view all actions in\nLogging. However, this link is not provided in all cases. Some\nsensitive actions, such as adding a project-level SSH key, can occur in several\ndifferent projects in your organization. In this case, Google can't provide you\nwith a single Logging link to view all the sensitive actions,\nbecause Logging is always scoped to a particular resource\n(project, folder, or organization).\n\nView all Sensitive Actions logs in the organization\n---------------------------------------------------\n\nIf you want to see all Sensitive Actions logs in your organization, you can\n[set up a Logging bucket](/logging/docs/central-log-storage) to\naggregate these logs.\n\nUse the following query to include all Sensitive Actions logs in the bucket: \n\n logName:sensitiveaction.googleapis.com%2Faction\n\nYou can add additional terms if you only want certain types of Sensitive Actions\nlogs, such as `AND \"add_ssh_key\"`.\n\nSet up alerts for Sensitive Actions logs\n----------------------------------------\n\nIf you want to get more frequent alerts about sensitive actions, you can\nconfigure a [log-based alert](/logging/docs/alerting/log-based-alerts). For\nexample, use the following query to match all Sensitive Actions logs: \n\n logName:sensitiveaction.googleapis.com%2Faction\n\nWhat's next\n-----------\n\n- Learn about [audit logging](/advisory-notifications/docs/audit-logging)."]]