Voting helps other researchers find interesting modules.
Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both allServices and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices", "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:[email protected]" ] }, { "log_type": "DATA_WRITE" }, { "log_type": "ADMIN_READ" } ] }, { "service": "sampleservice.googleapis.com", "audit_log_configs": [ { "log_type": "DATA_READ" }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:[email protected]" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts [email protected] from DATA_READ logging, and [email protected] from DATA_WRITE logging.
allServices
[email protected]
auditLogConfigs
list(GoogleApi.ContentWarehouse.V1.Model.GoogleIamV1AuditLogConfig.t)
nil
service
String.t
storage.googleapis.com
cloudsql.googleapis.com
Unwrap a decoded JSON object into its complex fields.
@type t() :: %GoogleApi.ContentWarehouse.V1.Model.GoogleIamV1AuditConfig{ auditLogConfigs: [GoogleApi.ContentWarehouse.V1.Model.GoogleIamV1AuditLogConfig.t()] | nil, service: String.t() | nil }
@spec decode(struct(), keyword()) :: struct()