Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Google Cloud Platform (GCP) Kubernetes Engine data connector allows you to monitor containerized applications, track performance metrics, and detect potential threats across your GKE environment.
Table attributes
Attribute | Value |
---|---|
Resource types | - |
Categories | Security |
Solutions | SecurityInsights |
Basic log | Yes |
Ingestion-time transformation | No |
Sample Queries | - |
Columns
Column | Type | Description |
---|---|---|
_BilledSize | real | The record size in bytes |
InsertId | string | A unique identifier for the log entry, used to deduplicate log records. |
_IsBillable | string | Specifies whether ingesting the data is billable. When _IsBillable is false ingestion isn't billed to your Azure account |
JsonPayload | dynamic | The JSON representation of the log entry payload, often containing key audit data when not using ProtoPayload. |
Labels | dynamic | Custom key-value pairs that provide additional metadata for the log entry, such as environment or custom tags. |
logName | string | The full name of the log (e.g., projects/[PROJECT_ID]/logs/cloudaudit.googleapis.com%2Factivity), showing the type and location of the log data. |
LogType | string | The category or type of log, such as GKEAudit, indicating the origin of the log data. |
Operation | dynamic | Contains information about an operation associated with the log, such as operation ID and producer. |
ProtoPayload | dynamic | A structured representation of the audit log entry using the Protobuf format. Contains detailed audit event data such as method name, status, and authentication info. |
ReceiveTimestamp | datetime | The time when the log entry was received by the logging system. |
Severity | string | The severity level of the log entry (e.g., INFO, WARNING, ERROR). Indicates the importance or impact of the event. |
SourceSystem | string | The type of agent the event was collected by. For example, OpsManager for Windows agent, either direct connect or Operations Manager, Linux for all Linux agents, or Azure for Azure Diagnostics |
TenantId | string | The Log Analytics workspace ID |
TimeGenerated | datetime | The timestamp indicating when the log event was created or generated by the source system. |
Type | string | The name of the table |