GoogleIamV1AuditConfig

AI Overview😉

  • The potential purpose of this module is to configure audit logging for specific services or all services, determining which permission types are logged and which identities are exempt from logging. In simple terms, it's like setting up a surveillance system to monitor and record specific activities within a service.
  • This module could impact search results by influencing how Google's algorithms weigh and process permission-related data. For instance, if a website is exempt from logging certain permission types, it may affect how Google's algorithms assess the website's trustworthiness or authority. This, in turn, could influence the website's ranking in search results.
  • A website may change things to be more favorable for this function by ensuring transparent and clear permission management, such as explicitly defining which permission types are logged and which identities are exempt. This could involve implementing robust access controls, regularly auditing permission configurations, and maintaining detailed logs of permission-related activities. By doing so, the website may be seen as more trustworthy and authoritative by Google's algorithms, potentially leading to improved search rankings.

Interesting Module? Vote 👇

Voting helps other researchers find interesting modules.

Current Votes: 0

GoogleApi.ContentWarehouse.V1.Model.GoogleIamV1AuditConfig (google_api_content_warehouse v0.4.0)

Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both allServices and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices", "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:[email protected]" ] }, { "log_type": "DATA_WRITE" }, { "log_type": "ADMIN_READ" } ] }, { "service": "sampleservice.googleapis.com", "audit_log_configs": [ { "log_type": "DATA_READ" }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:[email protected]" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts [email protected] from DATA_READ logging, and [email protected] from DATA_WRITE logging.

Attributes

  • auditLogConfigs (type: list(GoogleApi.ContentWarehouse.V1.Model.GoogleIamV1AuditLogConfig.t), default: nil) - The configuration for logging of each type of permission.
  • service (type: String.t, default: nil) - Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

Summary

Types

t()

Functions

decode(value, options)

Unwrap a decoded JSON object into its complex fields.

Types

Link to this type

t()

@type t() :: %GoogleApi.ContentWarehouse.V1.Model.GoogleIamV1AuditConfig{
  auditLogConfigs:
    [GoogleApi.ContentWarehouse.V1.Model.GoogleIamV1AuditLogConfig.t()] | nil,
  service: String.t() | nil
}

Functions

Link to this function

decode(value, options)

@spec decode(struct(), keyword()) :: struct()

Unwrap a decoded JSON object into its complex fields.