IBM Cloud Docs
Auditing events for service instances

Auditing events for service instances

IBM Cloud® service instances generate activity tracking events.

Activity tracking events report on activities that change the state of a service in IBM Cloud. You can use the events to investigate abnormal activity and critical actions and to comply with regulatory audit requirements.

You can use IBM Cloud Activity Tracker Event Routing, a platform service, to route auditing events in your account to destinations of your choice by configuring targets and routes that define where activity tracking events are sent. For more information, see About IBM Cloud Activity Tracker Event Routing.

You can use IBM Cloud Logs to visualize and alert on events that are generated in your account and routed by IBM Cloud Activity Tracker Event Routing to an IBM Cloud Logs instance.

Viewing activity tracking events for IBM® Db2® Warehouse as a Service

You can use IBM Cloud Logs to visualize and alert on events that are generated in your account and routed by IBM Cloud Activity Tracker Event Routing to an IBM Cloud Logs instance.

Launching IBM Cloud Logs from the Observability page

For information on launching the IBM Cloud Logs UI, see Launching the UI in the IBM Cloud Logs documentation.

Events for provisioning and managing service instances

The following table lists the actions that generate an event:

Actions that generate events
Action Description
service_name.instance.create An event is generated when you provision a service instance.
service_name.instance.update An event is generated when you rename a service instance or when you change the service plan.
service_name.instance.delete An event is generated when a service instance is deleted.
service_name.instance.schedule_reclaim An event is generated when a service instance is pending_reclamation.
service_name.instance.restore An event is generated when a service instance is restored.

Events for managing aliases that are associated to a service instance

An alias is a connection between your IAM-managed service within a resource group and an application within an org or a space.

The following table lists the actions that generate an event:

Actions that generate events
Action Description
service_name.alias.create An event is generated when an alias for an instance is created.
service_name.alias.update An event is generated when an alias for an instance is updated.
service_name.alias.delete An event is generated when an alias for an instance is deleted.

Events for managing service credentials that are associated to a service instance

A service credential provides the necessary information to connect an application to a service instance.

The following table lists the actions that generate an event:

Actions that generate events
Action Description
service_name.key.create An event is generated when an API key is created for a service instance through the Service credentials section of the service instance UI.
service_name.key.delete An event is generated when an API key that is associated with a service instance is deleted from the Service credentials section of the service instance UI.

Events for binding and unbinding a service instance to an app

The following table lists the actions that generate an event:

Actions that generate events
Action Description
service_name.binding.create An event is generated when you bind a service instance to an application.
service_name.binding.delete An event is generated when you unbind a service instance from an application.

Analyzing events

Action service_name.instance.delete

When a service instance is deleted, consider the following information:

  • Other actions are automatically triggered to clean up IAM permissions. These actions remove policies that are configured for users and service IDs in the account to work with the service instance.
  • The initiator of these actions is an IBM service ID.

When the service instance that is deleted does not have IAM policies configured for users and service IDs, the events that are automatically generated for any of these resources report an outcome offailure with a 404 outcome code. The following sample shows the events that are generated when a service instance that does not have policies configured in the account is deleted:

Apr 30 09:04:16 cloudcerts: delete instance Certificate Manager-v1
Apr 30 09:41:20 IAM Access Management: delete policy -failure
Apr 30 09:41:20 IAM Access Management: delete policy -failure