Skip to content

Audit events for google cloud logging configurations

What does this MR do and why?

Audit events for google cloud logging configurations

This commit adds audit events for create, update and delete actions on google cloud logging configurations

EE: true Changelog: added

How to set up and validate locally

  1. Create a Group.
  2. Add audit event destination
  3. Run the below GraphQL queries, and fill in the input correctly
  4. Check the audit events produced.
Action Event Name
create google_cloud_logging_configuration_created
update google_cloud_logging_configuration_updated
delete google_cloud_logging_configuration_deleted
mutation createGoogleCloudLoggingConfiguration {
  googleCloudLoggingConfigurationCreate(
    input: {
      groupPath: "complianceframework", 
      googleProjectIdName: "testing-id-45", 
      clientEmail: "test@example.com", 
      privateKey: "sdssssdsaa"}
  ) {
    googleCloudLoggingConfiguration {
      id
      googleProjectIdName
      logIdName
      privateKey
      clientEmail
    },
    errors,
  }
}

mutation updateGoogleCloudLoggingConfiguration {
  googleCloudLoggingConfigurationUpdate(input: {
    id: "gid://gitlab/AuditEvents::GoogleCloudLoggingConfiguration/22",
    googleProjectIdName: "testing-id-36",
  }){
    errors,
    googleCloudLoggingConfiguration {
      id,
      logIdName,
      privateKey,
      googleProjectIdName,
    },
  }
}

mutation destroyGoogleCloudLoggingConfiguration {
  googleCloudLoggingConfigurationDestroy(input: {
    id: "gid://gitlab/AuditEvents::GoogleCloudLoggingConfiguration/22"
  }){
    errors
  }
}

MR acceptance checklist

This checklist encourages us to confirm any changes have been analyzed to reduce risks in quality, performance, reliability, security, and maintainability.

Related to #409422 (closed)

Edited by Harsimar Sandhu

Merge request reports