Inspecting Cloud Logging Admin Activity Audit Logs

15 minutes
  • 4 Learning Objectives

About this Hands-on Lab

Any working computer system consists of a vast number of individual resources that are utilized each and every day. With Google Cloud, the Audit Logs keep track of the creation and deletion of these resources. IT professionals know that logs are their very best friend when it comes time to track down errors, misalignments, overcharges, and a host of other issues. In this hands-on lab, we’ll set up a couple of networks with associated subnets as well as a few Compute Engine instances, then use Cloud Logging to review the record of the installation. We will also make a significant change and note the logs’ response.

Learning Objectives

Successfully complete this lab by achieving the following learning objectives:

Explore the Created Services
  1. In the console, navigate to the Compute Engine > VM instances page.
  2. Review the existing VMs.
  3. From the main navigation menu, choose VPC Network > VPC network.
  4. Review the newly created networks.
  5. From the side navigation menu, choose Firewall rules.
  6. Review the non-default firewall rules.
Review Cloud Logging
  1. Navigate to the Cloud Logging interface
  2. View audit logs for the created VM instances, VPC networks, and Firewall rules.
Delete a Resource
  1. From the main navigation menu, select VPC Network > Firewall rules.
  2. Select the ssh-la-peer-2 rule and click Delete.
Review the logs of your delete action

Go to your primary GCP dashboard, click ACTIVITY and view the user-friendly activity logs.

Additional Resources

Your organization is about to move their primary app to Google Cloud, and you’ve been chosen to analyze the robustness of the admin activity logs. You need to set up a test that allows you to review generated logs when resources are created or deleted.

You’ll need to complete the following steps to accomplish your task:

  1. Verify the pre-deployed resources are in place.
  2. Review the logs for networks, firewall rules, and VM instances.
  3. Delete an existing firewall rule.
  4. Review the logs for activity.

What are Hands-on Labs

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?