Specifies the audit configuration for a service. The configuration
determines which permission types are logged, and what identities,
if any, are exempted from logging. An AuditConfig must have one or
more AuditLogConfigs. If there are AuditConfigs for both
allServices and a specific service, the union of the two
AuditConfigs is used for that service: the log_types specified in
each AuditConfig are enabled, and the exempted_members in each
AuditLogConfig are exempted. Example Policy with multiple
AuditConfigs: { "audit_configs": [ { "service": "allServices",
"audit_log_configs": [ { "log_type": "DATA_READ",
"exempted_members": [ "user:jose@example.com" ] }, { "log_type":
"DATA_WRITE" }, { "log_type": "ADMIN_READ" } ] }, { "service":
"sampleservice.googleapis.com", "audit_log_configs": [ { "log_type":
"DATA_READ" }, { "log_type": "DATA_WRITE", "exempted_members": [
"user:aliya@example.com" ] } ] } ] } For sampleservice, this policy
enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also
exempts jose@example.com from DATA_READ logging, and
aliya@example.com from DATA_WRITE logging.
str
Specifies a service that will be enabled for audit logging.
For example, storage.googleapis.com,
cloudsql.googleapis.com. allServices is a special
value that covers all services.
This field is a member of oneof_ _service.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-11 UTC."],[],[],null,["# Class AuditConfig (1.35.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.35.0 (latest)](/python/docs/reference/compute/latest/google.cloud.compute_v1.types.AuditConfig)\n- [1.34.0](/python/docs/reference/compute/1.34.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.33.0](/python/docs/reference/compute/1.33.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.32.0](/python/docs/reference/compute/1.32.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.31.0](/python/docs/reference/compute/1.31.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.30.0](/python/docs/reference/compute/1.30.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.29.0](/python/docs/reference/compute/1.29.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.28.0](/python/docs/reference/compute/1.28.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.27.0](/python/docs/reference/compute/1.27.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.26.0](/python/docs/reference/compute/1.26.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.25.0](/python/docs/reference/compute/1.25.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.24.0](/python/docs/reference/compute/1.24.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.23.0](/python/docs/reference/compute/1.23.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.22.0](/python/docs/reference/compute/1.22.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.21.0](/python/docs/reference/compute/1.21.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.20.1](/python/docs/reference/compute/1.20.1/google.cloud.compute_v1.types.AuditConfig)\n- [1.19.2](/python/docs/reference/compute/1.19.2/google.cloud.compute_v1.types.AuditConfig)\n- [1.18.0](/python/docs/reference/compute/1.18.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.17.0](/python/docs/reference/compute/1.17.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.16.1](/python/docs/reference/compute/1.16.1/google.cloud.compute_v1.types.AuditConfig)\n- [1.15.0](/python/docs/reference/compute/1.15.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.14.1](/python/docs/reference/compute/1.14.1/google.cloud.compute_v1.types.AuditConfig)\n- [1.13.0](/python/docs/reference/compute/1.13.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.12.1](/python/docs/reference/compute/1.12.1/google.cloud.compute_v1.types.AuditConfig)\n- [1.11.0](/python/docs/reference/compute/1.11.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.10.1](/python/docs/reference/compute/1.10.1/google.cloud.compute_v1.types.AuditConfig)\n- [1.9.0](/python/docs/reference/compute/1.9.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.8.0](/python/docs/reference/compute/1.8.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.7.0](/python/docs/reference/compute/1.7.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.6.1](/python/docs/reference/compute/1.6.1/google.cloud.compute_v1.types.AuditConfig)\n- [1.5.2](/python/docs/reference/compute/1.5.2/google.cloud.compute_v1.types.AuditConfig)\n- [1.4.0](/python/docs/reference/compute/1.4.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.3.2](/python/docs/reference/compute/1.3.2/google.cloud.compute_v1.types.AuditConfig)\n- [1.2.0](/python/docs/reference/compute/1.2.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.1.0](/python/docs/reference/compute/1.1.0/google.cloud.compute_v1.types.AuditConfig)\n- [1.0.0](/python/docs/reference/compute/1.0.0/google.cloud.compute_v1.types.AuditConfig)\n- [0.9.0](/python/docs/reference/compute/0.9.0/google.cloud.compute_v1.types.AuditConfig)\n- [0.8.0](/python/docs/reference/compute/0.8.0/google.cloud.compute_v1.types.AuditConfig)\n- [0.7.0](/python/docs/reference/compute/0.7.0/google.cloud.compute_v1.types.AuditConfig)\n- [0.6.0](/python/docs/reference/compute/0.6.0/google.cloud.compute_v1.types.AuditConfig)\n- [0.5.0](/python/docs/reference/compute/0.5.0/google.cloud.compute_v1.types.AuditConfig)\n- [0.4.2](/python/docs/reference/compute/0.4.2/google.cloud.compute_v1.types.AuditConfig)\n- [0.3.0](/python/docs/reference/compute/0.3.0/google.cloud.compute_v1.types.AuditConfig)\n- [0.2.1](/python/docs/reference/compute/0.2.1/google.cloud.compute_v1.types.AuditConfig)\n- [0.1.0](/python/docs/reference/compute/0.1.0/google.cloud.compute_v1.types.AuditConfig) \n\n AuditConfig(mapping=None, *, ignore_unknown_fields=False, **kwargs)\n\nSpecifies the audit configuration for a service. The configuration\ndetermines which permission types are logged, and what identities,\nif any, are exempted from logging. An AuditConfig must have one or\nmore AuditLogConfigs. If there are AuditConfigs for both\n`allServices` and a specific service, the union of the two\nAuditConfigs is used for that service: the log_types specified in\neach AuditConfig are enabled, and the exempted_members in each\nAuditLogConfig are exempted. Example Policy with multiple\nAuditConfigs: { \"audit_configs\": \\[ { \"service\": \"allServices\",\n\"audit_log_configs\": \\[ { \"log_type\": \"DATA_READ\",\n\"exempted_members\": \\[ \"user:jose@example.com\" \\] }, { \"log_type\":\n\"DATA_WRITE\" }, { \"log_type\": \"ADMIN_READ\" } \\] }, { \"service\":\n\"sampleservice.googleapis.com\", \"audit_log_configs\": \\[ { \"log_type\":\n\"DATA_READ\" }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": \\[\n\"user:aliya@example.com\" \\] } \\] } \\] } For sampleservice, this policy\nenables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also\nexempts `jose@example.com` from DATA_READ logging, and\n`aliya@example.com` from DATA_WRITE logging.\n\n.. _oneof: \u003chttps://proto-plus-python.readthedocs.io/en/stable/fields.html#oneofs-mutually-exclusive-fields\u003e"]]