Legacy to UAM Migration
Universal audit model (UAM) is Immuta's consistent structure for all Immuta system and user query audit logs. This reference guide maps the legacy audit events to the new UAM events and provides example schemas of all the UAM events available in Immuta.
To learn more about Immuta's audit, see the UAM reference page.
Events and descriptions
Legacy event | UAM event | Description |
---|---|---|
accessGroup |
An audit event for managing a group. | |
accessUser |
An audit event for managing a user. | |
acknowledgePurposes |
ProjectPurposesAcknowledged |
An audit event for acknowledging a purpose for a project in Immuta. |
addToProject |
DatasourceAppliedToProject |
An audit event for adding a data source to an Immuta project. |
apiKey |
An audit event for when an API key is created or deleted on the Immuta app settings page or from an Immuta user's profile page. | |
authenticate |
UserAuthenticated |
An audit event for a user authenticating in Immuta. |
- | UserLogout |
An audit event for a user logging out of Immuta. |
catalogUpdate |
DatasourceCatalogSynced |
An audit event for syncing an external catalog to tag Immuta data sources. |
configurationUpdate |
ConfigurationUpdated |
An audit event for updates to the configuration on the Immuta app settings page. |
collectionCreated |
DomainCreated |
An audit event for creating a domain. |
collectionDataSourceAdded |
DomainDataSourcesUpdated |
An audit event for updating a domain's data sources. |
collectionDataSourceRemoved |
DomainDataSourcesUpdated |
An audit event for updating a domain's data sources. |
collectionDataSourceUpdated |
DomainDataSourcesUpdated |
An audit event for updating a domain's data sources. |
collectionDeleted |
DomainDeleted |
An audit event for deleting a domain. |
collectionPermissionGranted |
DomainPermissionsUpdated |
An audit event for granting or revoking a user's domain-related permissions. |
collectionPermissionRevoked |
DomainPermissionsUpdated |
An audit event for granting or revoking a user's domain-related permissions. |
collectionUpdated |
DomainUpdated |
An audit event for updating an Immuta domain. |
dataSourceCreate |
DatasourceCreated |
An audit event for registering a table as an Immuta data source. |
dataSourceDelete |
DatasourceDeleted |
An audit event for deleting a data source in Immuta. |
- | DatasourceDisabledAuditEvent |
An audit event for disabling a data source in Immuta. |
dataSourceSave |
DatasourceUpdated |
An audit event for updating a data source with the new data source details. |
dataSourceSubscription |
The events for data source and project subscriptions. | |
dataSourceUpdate |
DatasourceUpdated |
An audit event for updating a data source with the new data source details. |
externalUserIdChanged |
UserUpdated |
An audit event for updating user details in Immuta. |
globalPolicyApplied |
DatasourceGlobalPolicyApplied |
An audit event for applying a global policy to a data source. |
globalPolicyApprovalRescinded |
GlobalPolicyApprovalRescinded |
An audit event for a global policy approval rescinded in the approve to promote workflow. |
globalPolicyApproved |
GlobalPolicyApproved |
An audit event for a global policy approved in the approve to promote workflow. |
globalPolicyCertify |
DatasourcePolicyCertified |
An audit event for a global policy being certified by a data owner for their data source. |
- | DatasourcePolicyDecertified |
An audit event for a global policy being decertified on a data source. |
globalPolicyChangeRequested |
GlobalPolicyChangeRequested |
An audit event for requested edits on a global policy in the approve to promote workflow. |
globalPolicyConflictResolved |
DatasourceGlobalPolicyConflictResolved |
An audit event for a global policy conflict being resolved on a data source. |
globalPolicyCreate |
GlobalPolicyCreated |
An audit event for creating a global policy. |
globalPolicyDelete |
GlobalPolicyDeleted |
An audit event for deleting a global policy. |
globalPolicyDisabled |
DatasourceGlobalPolicyDisabled |
An audit event for a data owner disabling a global policy from their data source. |
globalPolicyPromoted |
GlobalPolicyPromoted |
An audit event for when a global policy is fully approved and promoted to production in the approve to promote workflow. |
globalPolicyRemoved |
DatasourceGlobalPolicyRemoved |
An audit event for a data owner removing a global policy from their data source. |
globalPolicyReviewRequested |
GlobalPolicyReviewRequested |
An audit event for when a global policy is ready and requests a review in the approve to promote workflow. |
globalPolicyUpdate |
GlobalPolicyUpdated |
An audit event for updating a global policy with the new global policy details. |
licenseCreate |
LicenseCreated |
An audit event for creating an Immuta license. |
licenseDelete |
LicenseDeleted |
An audit event for deleting an Immuta license. |
nativeQuery |
|
An audit event for a user's query in Snowflake or Databricks Unity Catalog. See the Snowflake UAM page or the Databricks Unity Catalog UAM page for additional details about the audit event schema. |
policyAdjustmentCreate |
PolicyAdjustmentCreated |
An audit event for creating a policy adjustment in an Immuta project. |
policyAdjustmentDelete |
PolicyAdjustmentDeleted |
An audit event for deleting a policy adjustment in an Immuta project. |
policyCertificationExpired |
DatasourcePolicyCertificationExpired |
An audit event for a global policy certification expiring on a data source. |
policyHandlerCreate |
LocalPolicyCreated |
An audit event for creating a local policy for an Immuta data source. |
policyHandlerUpdate |
LocalPolicyUpdated |
An audit event for updating a local policy on an Immuta data source. |
prestoQuery |
TrinoQuery |
An audit event for a user's query in Starburst (Trino). See the Starburst (Trino) UAM page for additional details about the audit event schema. |
projectCreate |
ProjectCreated |
An audit event for creating a project in Immuta. |
projectDelete |
ProjectDeleted |
An audit event for deleting a project in Immuta. |
- | ProjectDisabled |
An audit event for disabling a project in Immuta. |
projectPurposeApprove |
ProjectPurposeApproved |
An audit event for approving a purpose for a project in Immuta. |
projectPurposeDeny |
ProjectPurposeDenied |
An audit event for denying a purpose for a project in Immuta. |
projectSubscription |
The events for data source and project subscriptions. | |
projectUpdate |
ProjectUpdated |
An audit event for updating a project in Immuta. |
purposeDelete |
PurposeDeleted |
An audit event for deleting a purpose in Immuta. |
purposeUpdate |
PurposeUpdated |
An audit event for updating a purpose in Immuta. |
purposeCreate |
PurposeUpserted |
An audit event for creating a purpose in Immuta. |
removeFromProject |
DatasourceRemovedFromProject |
An audit event for removing a data source from a project. |
sddClassifierCreated |
SDDClassifierCreated |
An audit event for creating a sensitive data discovery (SDD) column name regex, regex, or dictionary pattern. |
sddClassifierDeleted |
SDDClassifierDeleted |
An audit event for deleting a sensitive data discovery (SDD) pattern. |
sddClassifierUpdated |
SDDClassifierUpdated |
An audit event for updating a sensitive data discovery (SDD) column name regex, regex, or dictionary pattern. |
sddDatasourceTagUpdate |
SDDDatasourceTagUpdated |
An audit event for the results from a sensitive data discovery (SDD) run that updates the tags on Immuta data sources. |
sddTemplateApplied |
SDDTemplateApplied |
An audit event for applying an identification framework to data sources. |
sddTemplateCreated |
An audit event for creating an identification framework. | |
sddTemplateDeleted |
SDDTemplateDeleted |
An audit event for deleting an identification framework. |
sddTemplateUpdated |
SDDTemplateUpdated |
An audit event for updating an identification framework. |
spark |
DatabricksQuery |
An audit event for a user's query in Databricks. See the Databricks Spark UAM page for additional details about the audit event schema. |
tagAdded |
TagApplied |
An audit event for applying a tag to an object in Immuta. |
tagCreated |
TagCreated |
An audit event for creating a tag in Immuta. |
tagDeleted |
TagDeleted |
An audit event for deleting a tag in Immuta. |
tagRemoved |
TagRemoved |
An audit event for removing a tag from an object in Immuta. |
tagUpdated |
TagUpdated |
An audit event for updating a tag in Immuta. |
webhookCreate |
WebhookCreated |
An audit event for creating an Immuta webhook. |
webhookDelete |
WebhookDeleted |
An audit event for deleting an Immuta webhook. |
ApiKeyCreated event
{
"relatedResources": [],
"auditPayload": {
"type": "ApiKeyCreatedAuditPayload",
"apiKeyId": "1112158",
"name": "T1",
"version": 1
},
"action": "CREATE",
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"eventTimestamp": "2024-01-25T18:04:58.368Z",
"actor": {
"id": "taylor@immuta.com",
"identityProvider": "bim",
"profileId": "1",
"type": "USER_ACTOR",
"name": "Taylor Smith"
},
"targetType": "APIKEY",
"id": "d9dc3cee-98d0-47d6-ba81-e0b38f9f4014",
"receivedTimestamp": "2024-01-25T18:04:58.505Z",
"actorIp": "xxx.xx.xx.xx",
"targets": [],
"requestId": "60c68659-ac83-5299-bf3e-14856178a0de",
"sessionId": "9c553d7ace0aa3ee735fd3c14f737bc6"
}
- Event:
ApiKeyCreated
- Legacy event:
apiKey
- Description: An audit event for when an API key is created on the Immuta app settings page or from an Immuta user's profile page.
ApiKeyDeleted event
{
"id": "fe47ddd1-fd22-4dcf-9648-83950a10ef34",
"targetType": "APIKEY",
"receivedTimestamp": "2024-01-25T18:08:28.891Z",
"actor": {
"type": "USER_ACTOR",
"identityProvider": "bim",
"id": "taylor@immuta.com",
"profileId": "1",
"name": "Taylor Smith"
},
"requestId": "220c7faa-7f56-5d8c-aa31-8ac2212b7707",
"sessionId": "9c553d7ace0aa3ee735fd3c14f737bc6",
"targets": [],
"actorIp": "xxx.xx.xx.xx",
"relatedResources": [],
"auditPayload": {
"type": "ApiKeyDeletedAuditPayload",
"apiKeyId": "1112158",
"version": 1
},
"eventTimestamp": "2024-01-25T18:08:21.319Z",
"action": "DELETE",
"actionStatus": "SUCCESS",
"tenantId": "your-immuta-tenant.com"
}
- Event:
ApiKeyDeleted
- Legacy event:
apiKey
- Description: An audit event for when an API key is deleted on the Immuta app settings page or from an Immuta user's profile page.
AttributeApplied event
{
"actorIp": "xxx.xx.xx.xx",
"targets": [
{
"name": "Deepu Murty",
"id": "deepu@immuta.com",
"identityProvider": "bim",
"profileId": "20",
"type": "USER"
}
],
"requestId": "e45652cd-4d00-5def-8e8c-aca696822fc2",
"sessionId": "cdbffff8804103418350947c6586712c",
"actor": {
"type": "USER_ACTOR",
"profileId": "1",
"id": "taylor@immuta.com",
"identityProvider": "bim",
"name": "Taylor Smith"
},
"id": "63f111a7-0835-4696-8fdb-188130c44fac",
"targetType": "USER",
"receivedTimestamp": "2023-09-13T14:36:02.926Z",
"action": "ATTRIBUTE_APPLY",
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"eventTimestamp": "2023-09-13T14:36:02.688Z",
"relatedResources": [
{
"values": ["Product"],
"name": "Department",
"id": "department",
"type": "ATTRIBUTE"
}
],
"auditPayload": {
"entityType": "USER",
"type": "AttributeAppliedAuditPayload",
"version": 1,
"attributes": [
{
"values": ["Product"],
"attribute": "Department"
}
],
"entityIdProvider": "bim",
"entityId": "deepu@immuta.com"
}
}
- Event:
AttributeApplied
- Legacy events:
accessUser
andaccessGroup
- Description: An audit event for an attribute applied to a group or user.
- Additional parameter details:
targetType
will specify whether the attribute was added to aUSER
orGROUP
.
AttributeRemoved event
{
"relatedResources": [
{
"values": ["UNCLASSIFIED"],
"name": "classification",
"id": "classification",
"type": "ATTRIBUTE"
}
],
"auditPayload": {
"type": "AttributeRemovedAuditPayload",
"entityType": "USER",
"version": 1,
"attributes": [
{
"values": ["UNCLASSIFIED"],
"attribute": "classification"
}
],
"entityIdProvider": "bim",
"entityId": "deepu@immuta.com"
},
"action": "ATTRIBUTE_REMOVE",
"actionStatus": "SUCCESS",
"tenantId": "your-immuta-tenant.com",
"eventTimestamp": "2024-02-20T19:46:50.259Z",
"actor": {
"profileId": "1",
"id": "taylor@immuta.com",
"identityProvider": "bim",
"type": "USER_ACTOR",
"name": "Taylor Smith"
},
"id": "0fd77c61-f08a-488c-9d10-c356ffea0d11",
"targetType": "USER",
"receivedTimestamp": "2024-02-20T19:46:50.426Z",
"targets": [
{
"name": "Deepu Murty",
"type": "USER",
"id": "deepu@immuta.com",
"identityProvider": "bim",
"profileId": "20"
}
],
"actorIp": "xxx.xx.xx.xx",
"requestId": "146ec771-ec2e-5f40-8551-1dbc38e64078",
"sessionId": "893db38b8f1977fda75f60d168c4e74e"
}
- Event:
AttributeRemoved
- Legacy events:
accessUser
andaccessGroup
- Description: An audit event for an attribute removed from a group or user.
- Additional parameter details:
targetType
will specify whether the attribute was removed from aUSER
orGROUP
.
ConfigurationUpdated event
{
"eventTimestamp": "2023-12-04T18:38:25.801Z",
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"action": "CONFIGURATION_UPDATED",
"auditPayload": {
"version": 1,
"type": "ConfigurationUpdatedAuditPayload",
"changeSet": {
"plugins": {
"policy": {
"approveToPromote": {
"requiredApprovalCount": [
{
"newValue": 1,
"oldValue": 2
}
]
}
}
}
},
"configurationId": "20"
},
"relatedResources": [],
"sessionId": "aed83ab8b46affcb1169532dada92b72",
"requestId": "c80f510f-3f55-5450-8dea-d5e243708686",
"targets": [
{
"name": "20",
"type": "CONFIGURATION",
"id": "20"
}
],
"actorIp": "xxx.xx.xx.xx",
"receivedTimestamp": "2023-12-04T18:38:26.039Z",
"id": "3989e233-c791-43e9-813f-7738f4c8e26b",
"targetType": "CONFIGURATION",
"actor": {
"identityProvider": "bim",
"id": "taylor@immuta.com",
"profileId": "1",
"type": "USER_ACTOR",
"name": "Taylor Smith"
}
}
- Event:
ConfigurationUpdated
- Legacy event:
configurationUpdate
- Description: An audit event for updates to the configuration on the Immuta app settings page.
DatasourceAppliedToProject event
{
"auditPayload": {
"type": "DatasourceAppliedToProjectAuditPayload",
"errors": [],
"projectId": "2",
"version": 1,
"datasources": [
{
"id": "2",
"name": "Public Case"
}
]
},
"sessionId": "6b928653b1411078647a2764a72beca6",
"targets": [
{
"projectKey": "HumanResources",
"id": "2",
"type": "PROJECT",
"name": "Human Resources"
}
],
"action": "DATASOURCE_APPLY",
"id": "8106b44f-cf56-4ca2-a111-641d0e80e6ff",
"targetType": "PROJECT",
"actionStatus": "SUCCESS",
"relatedResources": [
{
"id": "2",
"technology": "SNOWFLAKE",
"type": "DATASOURCE",
"name": "Public Case"
}
],
"actor": {
"id": "taylor@immuta.com",
"profileId": "1",
"name": "Taylor Smith",
"identityProvider": "bim",
"type": "USER_ACTOR"
},
"eventTimestamp": "2023-10-13T14:08:20.427Z",
"actorIp": "xxx.xx.xx.xx",
"requestId": "8823f3f0-4e46-590c-bbb2-209cce750ff9",
"tenantId": "your-immuta-tenant.com",
"receivedTimestamp": "2023-10-13T14:08:20.660Z"
}
- Event:
DatasourceAppliedToProject
- Legacy event:
addToProject
- Description: An audit event for adding a data source to an Immuta project.
DatasourceCatalogSynced event
This UAM schema example is large and hidden from view. Click the arrow to open.
{
"tenantId": "your-immuta-tenant.com",
"action": "CATALOG_SYNC",
"actor": {
"type": "USER_ACTOR",
"identityProvider": "bim",
"name": "Taylor Smith",
"profileId": "1",
"id": "taylor@immuta.com"
},
"targetType": "DATASOURCE",
"actionStatus": "SUCCESS",
"eventTimestamp": "2023-04-14T16:48:21.159Z",
"id": "159d4299-fca5-47cb-aa6b-81d93bafa526",
"targets": [
{
"id": "9",
"name": "Public case",
"technology": "SNOWFLAKE",
"type": "DATASOURCE"
}
],
"relatedResources": [],
"receivedTimestamp": "2023-04-14T16:48:21.209Z",
"auditPayload": {
"datasourceId": "9",
"changes": {
"before": {
"catalogId": null,
"documentation": null,
"dictionary": [
{
"tags": [],
"columnName": "country"
},
{
"columnName": "date",
"tags": []
},
{
"tags": [],
"columnName": "fastest_qualifying"
},
{
"columnName": "location",
"tags": []
},
{
"columnName": "round",
"tags": []
},
{
"columnName": "winning_aircraft",
"tags": []
},
{
"tags": [],
"columnName": "winning_pilot"
}
],
"tableTags": null,
"description": null
},
"after": {
"description": "",
"tableTags": null,
"dictionary": [
{
"columnName": "country",
"description": "",
"tags": []
},
{
"tags": [],
"description": "",
"columnName": "date"
},
{
"tags": [],
"columnName": "fastest_qualifying",
"description": ""
},
{
"tags": [],
"columnName": "location",
"description": ""
},
{
"columnName": "round",
"description": "",
"tags": []
},
{
"tags": [],
"description": "",
"columnName": "winning_aircraft"
},
{
"columnName": "winning_pilot",
"description": "",
"tags": []
}
],
"catalogId": "immuta-product_engineering"
}
},
"type": "DatasourceCatalogSyncedAuditPayload"
}
}
- Event:
DatasourceCatalogSynced
- Legacy event:
catalogUpdate
- Description: An audit event for syncing an external catalog to tag Immuta data sources.
DatasourceCreated event
{
"id": "dc0b7313-ecc9-42f1-ba33-df0a1a753c08",
"action": "CREATE",
"actionStatus": "SUCCESS",
"actor": {
"name": "Taylor Smith",
"id": "taylor@immuta.com",
"identityProvider": "bim",
"profileId": "1",
"type": "USER_ACTOR"
},
"tenantId": "your-immuta-tenant.com",
"targetType": "DATASOURCE",
"targets": [
{
"type": "DATASOURCE",
"id": "102",
"name": "Pgboss Job",
"technology": "POSTGRESQL"
}
],
"relatedResources": [
{
"type": "CONNECTION",
"id": "4",
"name": "data-source-connection-name",
"connectionKey": "data-source-connection-key"
}
],
"auditPayload": {
"type": "DatasourceCreatedAuditPayload",
"version": 1,
"description": null,
"documentation": null,
"expiration": null,
"columnDetectionEnabled": true,
"disabled": false,
"technology": "POSTGRESQL",
"connectionId": "4",
"table": "job",
"schema": "pgboss",
"sensitiveDataDiscoveryEnabled": true
},
"eventTimestamp": "2024-02-22T13:59:04.681Z",
"receivedTimestamp": "2024-02-22T13:59:04.715Z"
}
- Event:
DatasourceCreated
- Legacy event:
dataSourceCreate
- Description: An audit event for registering a table as an Immuta data source.
DatasourceDeleted event
{
"id": "1403b675-70f6-4833-ab4c-a7486c63f494",
"action": "DELETE",
"actionStatus": "SUCCESS",
"actor": {
"name": "Taylor Smith",
"id": "taylor@immuta.com",
"identityProvider": "bim",
"profileId": "1",
"type": "USER_ACTOR"
},
"tenantId": "your-immuta-tenant.com",
"targetType": "DATASOURCE",
"targets": [
{
"type": "DATASOURCE",
"id": "93",
"name": "Audit",
"technology": "POSTGRESQL"
}
],
"relatedResources": [],
"auditPayload": {
"type": "DatasourceDeletedAuditPayload",
"version": 1,
"datasourceId": "93",
"name": "Audit",
"technology": "POSTGRESQL"
},
"eventTimestamp": "2024-02-22T14:20:42.379Z",
"receivedTimestamp": "2024-02-22T14:20:42.392Z"
}
- Event:
DatasourceDeleted
- Legacy event:
dataSourceDelete
- Description: An audit event for deleting a data source in Immuta.
DatasourceDisabled event
{
"id": "a09b9bc3-3775-4496-87ec-b808cf649794",
"sessionId": "0fcaaf9c074330b4b875746c2e52739c",
"requestId": "153fe145-32a0-5c33-930d-c571c1d7748d",
"action": "DISABLE",
"actionStatus": "SUCCESS",
"actor": {
"name": "Taylor Smith",
"id": "taylor@immuta.com",
"identityProvider": "bim",
"profileId": "1",
"type": "USER_ACTOR"
},
"actorIp": "xxx.xx.xx.xx",
"tenantId": "your-immuta-tenant.com",
"targetType": "DATASOURCE",
"targets": [
{
"type": "DATASOURCE",
"id": "57",
"name": "Activity",
"technology": "POSTGRESQL"
}
],
"relatedResources": [],
"auditPayload": {
"type": "DatasourceDisabledAuditPayload",
"version": 1,
"datasourceId": "57",
"name": "Activity",
"technology": "POSTGRESQL"
},
"eventTimestamp": "2024-02-22T14:22:20.039Z",
"receivedTimestamp": "2024-02-22T14:22:20.183Z"
}
- Event:
DatasourceDisabled
- Legacy event: None
- Description: An audit event for disabling a data source in Immuta.
DatasourceGlobalPolicyApplied event
{
"receivedTimestamp": "2023-10-24T18:06:27.645Z",
"auditPayload": {
"conflict": null,
"version": 1,
"policy": {
"actions": [
{
"dataPolicyType": "MASKING",
"rules": [
{
"exceptions": null,
"type": "MASKING_HASH",
"fields": ["AWARD_ID"],
"ruleAppliedForUser": false
}
],
"type": "DATA",
"global": false,
"rationale": null
}
],
"type": "DATA"
},
"type": "DatasourceGlobalPolicyAppliedAuditPayload"
},
"relatedResources": [
{
"policyKey": "Mask PII",
"name": "Mask PII",
"type": "GLOBAL_POLICY",
"id": "7"
}
],
"id": "7f57d63a-5db8-412a-ad93-c6baa61384b3",
"targetType": "DATASOURCE",
"actor": {
"profileId": "1",
"identityProvider": "bim",
"id": "taylor@immuta.com",
"type": "USER_ACTOR",
"name": "Taylor Smith"
},
"eventTimestamp": "2023-10-24T18:06:27.617Z",
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"targets": [
{
"id": "47",
"type": "DATASOURCE",
"technology": "SNOWFLAKE",
"name": "Public case"
}
],
"action": "POLICY_APPLIED"
}
- Event:
DatasourceGlobalPolicyApplied
- Legacy event:
globalPolicyApplied
- Description: An audit event for applying a global policy to a data source.
DatasourceGlobalPolicyConflictResolved event
{
"actor": {
"name": "Taylor Smith",
"profileId": "1",
"identityProvider": "bim",
"id": "taylor@immuta.com",
"type": "USER_ACTOR"
},
"id": "ac9c699a-aad0-4899-964c-279cd7eba125",
"targetType": "DATASOURCE",
"relatedResources": [],
"auditPayload": {
"type": "DatasourceGlobalPolicyConflictResolvedAuditPayload",
"version": 1
},
"receivedTimestamp": "2023-10-24T18:34:04.330Z",
"action": "POLICY_CONFLICT_RESOLVED",
"targets": [
{
"name": "Public case",
"technology": "SNOWFLAKE",
"id": "47",
"type": "DATASOURCE"
}
],
"actionStatus": "SUCCESS",
"tenantId": "your-immuta-tenant.com",
"eventTimestamp": "2023-10-24T18:34:04.301Z"
}
- Event:
DatasourceGlobalPolicyConflictResolved
- Legacy event:
globalPolicyConflictResolved
- Description: An audit event for a global policy conflict being resolved on a data source.
DatasourceGlobalPolicyDisabled event
{
"relatedResources": [
{
"id": "7",
"type": "GLOBAL_POLICY",
"name": "Mask PII",
"policyKey": "mask pii"
}
],
"targetType": "DATASOURCE",
"id": "4853154c-8825-4138-800d-913cbab56af6",
"receivedTimestamp": "2023-10-24T18:13:25.004Z",
"auditPayload": {
"version": 1,
"type": "DatasourceGlobalPolicyDisabledAuditPayload"
},
"actor": {
"id": "taylor@immuta.com",
"identityProvider": "bim",
"profileId": "1",
"type": "USER_ACTOR",
"name": "Taylor Smith"
},
"eventTimestamp": "2023-10-24T18:13:24.975Z",
"action": "POLICY_DISABLED",
"targets": [
{
"id": "47",
"type": "DATASOURCE",
"name": "Public case",
"technology": "SNOWFLAKE"
}
],
"actionStatus": "SUCCESS",
"tenantId": "your-immuta-tenant.com"
}
- Event:
DatasourceGlobalPolicyDisabled
- Legacy event:
globalPolicyDisabled
- Description: An audit event for a data owner disabling a global policy from their data source.
DatasourceGlobalPolicyRemoved event
{
"actor": {
"name": "Taylor Smith",
"type": "USER_ACTOR",
"identityProvider": "bim",
"id": "taylor@immuta.com",
"profileId": "1"
},
"auditPayload": {
"type": "DatasourceGlobalPolicyRemovedAuditPayload",
"conflict": null,
"policy": {
"type": "DATA",
"actions": [
{
"dataPolicyType": "MASKING",
"rationale": null,
"global": false,
"type": "DATA",
"rules": [
{
"type": "MASKING_HASH",
"exceptions": null,
"ruleAppliedForUser": false,
"fields": ["PII"]
}
]
}
]
},
"version": 1
},
"receivedTimestamp": "2023-10-24T18:06:27.635Z",
"id": "4a27ab2f-156e-4cff-a3bc-65184d74ccd5",
"targetType": "DATASOURCE",
"relatedResources": [
{
"policyKey": "mask pii",
"name": "Mask PII",
"id": "7",
"type": "GLOBAL_POLICY"
}
],
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"targets": [
{
"type": "DATASOURCE",
"id": "47",
"name": "Public case",
"technology": "SNOWFLAKE"
}
],
"action": "POLICY_REMOVED",
"eventTimestamp": "2023-10-24T18:06:27.617Z"
}
- Event:
DatasourceGlobalPolicyRemoved
- Legacy event:
globalPolicyRemoved
- Description: An audit event for a data owner removing a global policy from their data source.
DatasourcePolicyCertificationExpired event
{
"actionStatus": "SUCCESS",
"tenantId": "your-immuta-tenant.com",
"targets": [
{
"technology": "SNOWFLAKE",
"name": "Public case",
"type": "DATASOURCE",
"id": "47"
}
],
"action": "DECERTIFY_POLICY",
"eventTimestamp": "2023-10-16T19:49:25.365Z",
"actor": {
"type": "SYSTEM_ACCOUNT",
"id": "immuta_system_account",
"name": "Immuta System Account"
},
"auditPayload": {
"expirationDate": "2023-10-16T19:49:25.365Z",
"type": "DatasourcePolicyCertificationExpiredAuditPayload",
"version": 1
},
"receivedTimestamp": "2023-10-16T19:49:25.387Z",
"targetType": "DATASOURCE",
"id": "aedc4025-d888-4407-b837-659dca4d0e80",
"relatedResources": [
{
"type": "GLOBAL_POLICY",
"id": "7",
"policyKey": "mask pii",
"name": "Mask PII"
}
]
}
- Event:
DatasourcePolicyCertificationExpired
- Legacy event:
policyCertificationExpired
- Description: An audit event for a global policy certification expiring on a data source.
DatasourcePolicyCertified event
{
"receivedTimestamp": "2023-10-03T18:35:32.666Z",
"id": "04947a9b-0206-4c2d-bce0-0d969b68350b",
"targetType": "DATASOURCE",
"actor": {
"type": "USER_ACTOR",
"profileId": "1",
"id": "taylor@immuta.com",
"identityProvider": "bim",
"name": "Taylor Smith"
},
"sessionId": "95ca3d7f5d3d2a2b82cecb3ff1051b63",
"requestId": "bf443424-2e49-5a13-9009-8b527a3f65f3",
"targets": [
{
"id": "44",
"type": "DATASOURCE",
"technology": "SNOWFLAKE",
"name": "Public case"
}
],
"actorIp": "xxx.xx.xx.xx",
"auditPayload": {
"type": "DatasourcePolicyCertifiedAuditPayload",
"columns": [
{
"name": "Full name",
"tags": [
{
"deleted": false,
"id": "23",
"type": "TAG",
"context": "manual",
"source": "curated",
"name": "PII"
}
]
}
],
"certificationDate": "2023-10-03T18:35:32.607Z",
"version": 1
},
"relatedResources": [
{
"type": "GLOBAL_POLICY",
"id": "3",
"name": "Mask PHI",
"policyKey": "Mask PHI"
}
],
"eventTimestamp": "2023-10-03T18:35:32.484Z",
"actionStatus": "SUCCESS",
"tenantId": "your-immuta-tenant.com",
"action": "POLICY_CERTIFY"
}
- Event:
DatasourcePolicyCertified
- Legacy event:
globalPolicyCertify
- Description: An audit event for a global policy being certified by a data owner for their data source.
DatasourcePolicyDecertified event
{
"actorIp": "xxx.xx.xx.xx",
"targets": [
{
"id": "44",
"type": "DATASOURCE",
"technology": "SNOWFLAKE",
"name": "Public case"
}
],
"requestId": "270aa26c-e424-53cf-af06-d290c8bfa308",
"sessionId": "95ca3d7f5d3d2a2b82cecb3ff1051b63",
"actor": {
"identityProvider": "bim",
"id": "taylor@immuta.com",
"profileId": "1",
"type": "USER_ACTOR",
"name": "Taylor Smith"
},
"targetType": "DATASOURCE",
"id": "31c902a8-5cbc-4171-baaa-2428080fac91",
"receivedTimestamp": "2023-10-03T19:25:34.166Z",
"action": "DECERTIFY_POLICY",
"actionStatus": "SUCCESS",
"tenantId": "your-immuta-tenant.com",
"eventTimestamp": "2023-10-03T19:25:34.094Z",
"relatedResources": [
{
"name": "Mask PII",
"policyKey": "mask pii",
"id": "7",
"type": "GLOBAL_POLICY"
}
],
"auditPayload": {
"version": 1,
"type": "DatasourcePolicyDecertifiedAuditPayload",
"decertificationDate": "2023-10-03T19:25:34.121Z"
}
}
- Event:
DatasourcePolicyDecertified
- Legacy events: None
- Description: An audit event for a global policy being decertified on a data source.
DatasourceRemovedFromProject event
{
"id": "77de32df-1655-4618-b0bf-e6883483a151",
"sessionId": "285574f9f1fd35b1fc7dba060e0786a2",
"requestId": "e35f9736-f206-53fd-ab02-043bce216e52",
"action": "DATASOURCE_REMOVE",
"actionStatus": "SUCCESS",
"actor": {
"name": "Taylor Smith",
"id": "taylor@immuta.com",
"identityProvider": "bim",
"profileId": "1",
"type": "USER_ACTOR"
},
"actorIp": "xxx.xx.xx.xx",
"tenantId": "your-immuta-tenant.com",
"targetType": "PROJECT",
"targets": [
{
"type": "PROJECT",
"name": "Human Resources",
"id": "13",
"projectKey": "humanresources"
}
],
"relatedResources": [
{
"type": "DATASOURCE",
"id": "54",
"name": "Customers",
"technology": "POSTGRESQL"
}
],
"auditPayload": {
"type": "DatasourceRemovedFromProjectAuditPayload",
"version": 1,
"projectId": "13",
"datasources": [
{
"id": "54",
"name": "Customers"
}
],
"errors": []
},
"eventTimestamp": "2024-02-29T18:19:08.881Z",
"receivedTimestamp": "2024-02-29T18:19:09.071Z"
}
- Event:
DatasourceRemovedFromProject
- Legacy event:
removeFromProject
- Description: An audit event for removing a data source from a project.
DatasourceUpdated event
{
"id": "d6e6115a-e508-4ace-83af-5b6da9a25884",
"action": "UPDATE",
"actionStatus": "SUCCESS",
"actor": {
"name": "Taylor Smith",
"id": "taylor@immuta.com",
"identityProvider": "bim",
"profileId": "1",
"type": "USER_ACTOR"
},
"tenantId": "your-immuta-tenant.com",
"targetType": "DATASOURCE",
"targets": [
{
"type": "DATASOURCE",
"id": "66",
"name": "Public case",
"technology": "POSTGRESQL"
}
],
"relatedResources": [],
"auditPayload": {
"type": "DatasourceUpdatedAuditPayload",
"version": 1,
"name": "Public case",
"description": null,
"documentation": "New documentation to descripe the table.",
"expiration": null,
"columnDetectionEnabled": true,
"disabled": false,
"datasourceId": "66"
},
"eventTimestamp": "2024-02-22T14:24:45.048Z",
"receivedTimestamp": "2024-02-22T14:24:45.069Z"
}
- Event:
DatasourceUpdated
- Legacy events:
dataSourceUpdate
anddataSourceSave
- Description: An audit event for updating a data source with the new data source details.
DomainCreated event
{
"sessionId": "227c3dbbbfe78ecd693c84979a930c22",
"actionStatus": "SUCCESS",
"targetType": "DOMAIN",
"actorIp": "xxx.xx.xx.xx",
"receivedTimestamp": "2023-12-20T20:01:03.651Z",
"requestId": "460ce02b-30d5-5e68-bff0-b31e6ea44ba0",
"id": "f99bc30e-13f6-4041-a0ad-20750a27519e",
"actor": {
"id": "taylor@immuta.com",
"name": "Taylor Smith",
"identityProvider": "bim",
"profileId": "1",
"type": "USER_ACTOR"
},
"action": "CREATE",
"tenantId": "your-immuta-tenant.com",
"auditPayload": {
"domain": {
"description": "A domain for financial data.",
"name": "Finance Domain",
"domainType": "DOMAIN",
"id": "11e7011d-a365-4933-abcb-d5febc03d310"
},
"version": 1,
"type": "DomainCreatedAuditPayload"
},
"relatedResources": [],
"targets": [
{
"name": "Finance Domain",
"domainType": "domain",
"type": "DOMAIN",
"id": "11e7011d-a365-4933-abcb-d5febc03d310"
}
],
"eventTimestamp": "2023-12-20T20:01:03.065Z"
}
- Event:
DomainCreated
- Legacy event:
collectionCreated
- Description: An audit event for creating a domain.
DomainDataSourcesUpdated event
{
"action": "MODIFY_DOMAIN",
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"targetType": "DOMAIN",
"modifiedResourceType": "DATASOURCE",
"actor": {
"type": "USER_ACTOR",
"profileId": "1",
"identityProvider": "bim",
"name": "Taylor Smith",
"id": "taylor@immuta.com"
},
"id": "bef14718-5fa8-4891-bb9e-47f7a332a70b",
"eventTimestamp": "2023-12-20T20:23:14.432Z",
"auditPayload": {
"updateType": "ADD",
"version": 1,
"type": "DomainDataSourcesUpdatedAuditPayload"
},
"receivedTimestamp": "2023-12-20T20:23:14.456Z",
"relatedResources": [
{
"name": "Public case",
"type": "DATASOURCE",
"technology": "POSTGRESQL",
"id": "381"
}
],
"targets": [
{
"id": "11e7011d-a365-4933-abcb-d5febc03d310",
"name": "Finance Domain",
"domainType": "domain",
"type": "DOMAIN"
}
]
}
- Event:
DomainDataSourcesUpdated
- Legacy events:
collectionDataSourceAdded
,collectionDataSourceRemoved
, andcollectionDataSourceUpdated
- Description: An audit event for updating a domain's data sources.
- Additional parameter details: auditPayload.updateType will specify whether the data source was added to or removed from the domain.
DomainDeleted event
{
"relatedResources": [],
"targets": [
{
"type": "DOMAIN",
"name": "Finance Domain",
"domainType": "DOMAIN",
"id": "6eb5a6df-67d8-4de7-adbd-24eb7271eaea"
}
],
"auditPayload": {
"version": 1,
"domain": {
"id": "6eb5a6df-67d8-4de7-adbd-24eb7271eaea",
"name": "Finance Domain",
"domainType": "DOMAIN"
},
"type": "DomainDeletedAuditPayload"
},
"eventTimestamp": "2023-12-20T20:21:13.981Z",
"actor": {
"id": "kris@immuta.com",
"identityProvider": "bim",
"name": "Taylor Smith",
"profileId": "1",
"type": "USER_ACTOR"
},
"tenantId": "your-immuta-tenant.com",
"action": "DELETE",
"requestId": "7884603d-8911-5f33-a9a7-d8560eb49a89",
"receivedTimestamp": "2023-12-20T20:21:14.077Z",
"id": "3a82ceb6-6592-4ddf-9055-6920d87bba32",
"actionStatus": "SUCCESS",
"targetType": "DOMAIN",
"sessionId": "227c3dbbbfe78ecd693c84979a930c22",
"actorIp": "xxx.xx.xx.xx"
}
- Event:
DomainDeleted
- Legacy event:
collectionDeleted
- Description: An audit event for deleting a domain.
DomainPermissionsUpdated event
{
"eventTimestamp": "2023-12-20T20:01:03.065Z",
"relatedResources": [
{
"type": "USER",
"name": "Taylor Smith",
"identityProvider": "bim",
"profileId": "1",
"id": "taylor@immuta.com"
},
{
"type": "USER",
"profileId": "1",
"name": "Taylor Smith",
"identityProvider": "bim",
"id": "taylor@immuta.com"
}
],
"targets": [
{
"name": "Finance Domain",
"domainType": "domain",
"type": "DOMAIN",
"id": "11e7011d-a365-4933-abcb-d5febc03d310"
}
],
"auditPayload": {
"updateType": "GRANT",
"version": 1,
"permissionUpdates": [
{
"permission": "MANAGE_POLICIES",
"profileId": "1"
}
],
"type": "DomainPermissionsUpdatedAuditPayload"
},
"tenantId": "your-immuta-tenant.com",
"action": "MODIFY_DOMAIN",
"actor": {
"identityProvider": "bim",
"name": "Taylor Smith",
"profileId": "1",
"type": "USER_ACTOR",
"id": "taylor@immuta.com"
},
"modifiedResourceType": "USER",
"id": "377ee78b-74da-4466-bdc1-22d531c1f61c",
"requestId": "460ce02b-30d5-5e68-bff0-b31e6ea44ba0",
"receivedTimestamp": "2023-12-20T20:01:03.576Z",
"actorIp": "xxx.xx.xx.xx",
"sessionId": "227c3dbbbfe78ecd693c84979a930c22",
"targetType": "DOMAIN",
"actionStatus": "SUCCESS"
}
- Event:
DomainPermissionsUpdated
- Legacy events:
collectionPermissionGranted
andcollectionPermissionRevoked
- Description: An audit event for granting or revoking a user's domain-related permissions.
- Additional parameter details: auditPayload.updateType will specify whether the permission was granted to or revoked from a user.
DomainUpdated event
{
"id": "d61d6ac9-2897-4d34-84f3-16181ddb9212",
"sessionId": "adba345c6949d7f7761367c0769b983d",
"requestId": "9a64147e-5b57-5905-9e7c-54b5a5c461c8",
"action": "UPDATE",
"actionStatus": "SUCCESS",
"actor": {
"name": "Taylor Smith",
"id": "taylor@immuta.com",
"identityProvider": "bim",
"profileId": "1",
"type": "USER_ACTOR"
},
"actorIp": "xxx.xx.xx.xx",
"tenantId": "your-immuta-tenant.com",
"targetType": "DOMAIN",
"targets": [
{
"type": "DOMAIN",
"id": "69347b14-1cda-41e1-9186-e85853158299",
"name": "Finance Domain v2",
"domainType": "domain"
}
],
"relatedResources": [],
"auditPayload": {
"type": "DomainUpdatedAuditPayload",
"modifiedFields": [
"name",
"description"
],
"domain": {
"id": "69347b14-1cda-41e1-9186-e85853158299",
"name": "Finance Domain v2",
"description": "Only use for finance tables."
},
"version": 1
},
"eventTimestamp": "2023-12-12T18:26:29.618Z",
"receivedTimestamp": "2023-12-12T18:26:32.472Z"
}
- Event:
DomainUpdated
- Legacy event:
collectionUpdated
- Description: An audit event for updating an Immuta domain.
GlobalPolicyApprovalRescinded event
{
"targets": [
{
"id": "12",
"type": "GLOBAL_POLICY",
"name": "Mask PII",
"policyKey": "mask pii"
}
],
"actorIp": "xxx.xx.xx.xx",
"sessionId": "c6eb428b869864f798f17fd7d5d0215a",
"requestId": "10a78dee-6181-52dd-8b68-5461b6172e40",
"actor": {
"name": "Deepu Murty",
"profileId": "999111223",
"identityProvider": "bim",
"id": "deepu@immuta.com",
"type": "USER_ACTOR"
},
"receivedTimestamp": "2023-11-03T18:23:25.966Z",
"id": "5ff5640f-4fc3-4634-a0e2-c625e0ffb447",
"targetType": "GLOBAL_POLICY",
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"action": "GLOBAL_POLICY_APPROVAL_RESCINDED",
"eventTimestamp": "2023-11-03T18:23:25.861Z",
"auditPayload": {
"comment": "This policy isn't ready for production. Please mask PII.",
"type": "GlobalPolicyApprovalRescindedAuditPayload",
"approvalRequestId": "2",
"version": 1
},
"relatedResources": []
}
- Event:
GlobalPolicyApprovalRescinded
- Legacy event:
globalPolicyApprovalRescinded
- Description: An audit event for a global policy approval rescinded in the approve to promote workflow.
GlobalPolicyApproved event
{
"auditPayload": {
"comment": "This policy looks good for production.",
"approvalRequestId": "2",
"type": "GlobalPolicyApprovedAuditPayload",
"version": 1
},
"relatedResources": [],
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"action": "GLOBAL_POLICY_APPROVED",
"eventTimestamp": "2023-11-03T18:22:12.040Z",
"actor": {
"name": "Deepu Murty",
"type": "USER_ACTOR",
"id": "deepu@immuta.com",
"identityProvider": "bim",
"profileId": "999111223"
},
"receivedTimestamp": "2023-11-03T18:22:12.153Z",
"id": "271dc5ff-b23e-4da6-8066-91a35fda02e4",
"targetType": "GLOBAL_POLICY",
"targets": [
{
"name": "Mask PII",
"policyKey": "mask pii",
"type": "GLOBAL_POLICY",
"id": "12"
}
],
"actorIp": "xxx.xx.xx.xx",
"sessionId": "c6eb428b869864f798f17fd7d5d0215a",
"requestId": "50863cf9-6a8a-5299-89e2-200771eab62c"
}
- Event:
GlobalPolicyApproved
- Legacy event:
globalPolicyApproved
- Description: An audit event for a global policy approved in the approve to promote workflow.
GlobalPolicyChangeRequested event
{
"eventTimestamp": "2023-11-03T18:20:16.483Z",
"action": "GLOBAL_POLICY_CHANGE_REQUESTED",
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"relatedResources": [],
"auditPayload": {
"approvalRequestId": "1",
"type": "GlobalPolicyChangeRequestedAuditPayload",
"comment": "Please add additional controls on personal data.",
"version": 1
},
"requestId": "4afc86e6-dee6-5756-b02e-b22e92d237c4",
"sessionId": "be1e7a02ba2a5e65a6848c752ee0838b",
"targets": [
{
"name": "Mask PII",
"policyKey": "mask pii",
"type": "GLOBAL_POLICY",
"id": "12"
}
],
"actorIp": "xxx.xx.xx.xx",
"id": "77277757-331a-4a13-ba21-cbfeab01d47f",
"targetType": "GLOBAL_POLICY",
"receivedTimestamp": "2023-11-03T18:20:16.581Z",
"actor": {
"profileId": "999111223",
"id": "deepu@immuta.com",
"identityProvider": "bim",
"type": "USER_ACTOR",
"name": "Deepu Murty"
}
}
- Event:
GlobalPolicyChangeRequested
- Legacy event:
globalPolicyChangeRequested
- Description: An audit event for requested edits on a global policy in the approve to promote workflow.
GlobalPolicyCreated event
{
"targetType": "GLOBAL_POLICY",
"id": "aac7cb75-c6ec-48ed-a11e-f6d8bf29dfe6",
"relatedResources": [],
"actor": {
"id": "taylor@immuta.com",
"profileId": "1",
"identityProvider": "bim",
"name": "Taylor Smith",
"type": "USER_ACTOR"
},
"actionStatus": "SUCCESS",
"sessionId": "517a11643dcdbba0b5ba30d49ee7a334",
"auditPayload": {
"type": "GlobalPolicyCreatedAuditPayload",
"policy": {
"type": "DATA",
"actions": [
{
"type": "DATA",
"rules": [
{
"type": "MASKING_HASH",
"columnCondition": {
"type": "TAG",
"tags": ["Testing"]
},
"exceptions": null
}
],
"dataPolicyType": "MASKING",
"rationale": null
}
],
"circumstance": {
"conditions": [
{
"type": "TAG",
"tagType": "COLUMN",
"tag": "Testing"
}
],
"operator": "any",
"type": "CONDITIONAL"
}
}
},
"targets": [
{
"policyKey": "mask pii",
"type": "GLOBAL_POLICY",
"name": "Mask PII",
"id": "5"
}
],
"action": "CREATE",
"eventTimestamp": "2023-05-10T18:29:39.438Z",
"actorIp": "xxx.xx.xx.xx",
"requestId": "2b126931-7a15-5678-99c4-11f0c5b40365",
"receivedTimestamp": "2023-05-10T18:29:39.636Z",
"tenantId": "your-immuta-tenant.com"
}
- Event:
GlobalPolicyCreated
- Legacy event:
globalPolicyCreate
- Description: An audit event for creating a global policy.
GlobalPolicyDeleted event
{
"requestId": "12674fb7-4b90-5500-906f-7277a240e0f8",
"eventTimestamp": "2023-09-13T19:42:53.029Z",
"actorIp": "xxx.xx.xx.xx",
"tenantId": "your-immuta-tenant.com",
"receivedTimestamp": "2023-09-13T19:42:53.157Z",
"id": "d8cb76a2-516d-41f7-98d9-1cb616b759a4",
"targetType": "GLOBAL_POLICY",
"actionStatus": "SUCCESS",
"actor": {
"name": "Taylor Smith",
"identityProvider": "bim",
"type": "USER_ACTOR",
"id": "taylor@immuta.com",
"profileId": "1"
},
"relatedResources": [],
"auditPayload": {
"version": 1,
"policy": {
"actions": [
{
"subscriptionPolicyType": "AUTOMATIC",
"type": "SUBSCRIPTION",
"rationale": null,
"accessGrant": "READ"
}
],
"type": "SUBSCRIPTION",
"circumstance": {
"type": "WHEN_SELECTED"
}
},
"type": "GlobalPolicyDeletedAuditPayload"
},
"sessionId": "2d48cc8df46b3b3eedf543f4192b6726",
"action": "DELETE",
"targets": [
{
"policyKey": "mask pii",
"type": "GLOBAL_POLICY",
"name": "Mask PII",
"id": "6"
}
]
}
- Event:
GlobalPolicyDeleted
- Legacy event:
globalPolicyDelete
- Description: An audit event for deleting a global policy.
GlobalPolicyPromoted event
{
"sessionId": "89fc6c8f7b6e04d9b9d4f720dbd84890",
"requestId": "6abef8eb-6acb-5364-9a88-7479b03227cf",
"actorIp": "xxx.xx.xx.xx",
"targets": [
{
"name": "Mask PII",
"policyKey": "maks pii",
"type": "GLOBAL_POLICY",
"id": "12"
}
],
"receivedTimestamp": "2023-11-08T14:57:36.465Z",
"targetType": "GLOBAL_POLICY",
"id": "990f260b-eef6-4eed-8f71-f48c8e9b88cb",
"actor": {
"name": "Taylor Smith",
"identityProvider": "bim",
"id": "taylor@immuta.com",
"profileId": "1",
"type": "USER_ACTOR"
},
"eventTimestamp": "2023-11-08T14:57:36.387Z",
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS",
"action": "GLOBAL_POLICY_PROMOTED",
"auditPayload": {
"type": "GlobalPolicyPromotedAuditPayload",
"policyName": "Mask PII",
"version": 1,
"policyId": "12"
},
"relatedResources": []
}
- Event:
GlobalPolicyPromoted
- Legacy event:
globalPolicyPromoted
- Description: An audit event for when a global policy is fully approved and promoted to production in the approve to promote workflow.
GlobalPolicyReviewRequested event
{
"targetType": "GLOBAL_POLICY",
"id": "a26fa653-e545-4a34-9488-d7f1b92379d0",
"receivedTimestamp": "2023-11-03T18:16:30.588Z",
"actor": {
"name": "Taylor Smith",
"type": "USER_ACTOR",
"profileId": "1",
"identityProvider": "bim",
"id": "taylor@immuta.com"
},
"requestId": "9a03030a-09ef-5d2b-abea-b65305901e9b",
"sessionId": "1f468d12a437bceb59b71054d6ad8bf8",
"actorIp": "xxx.xx.xx.xx",
"targets": [
{
"name": "Mask PII",
"policyKey": "mask pii",
"type": "GLOBAL_POLICY",
"id": "12"
}
],
"relatedResources": [],
"auditPayload": {
"type": "GlobalPolicyReviewRequestedAuditPayload",
"approvalRequestId": "1",
"version": 1
},
"eventTimestamp": "2023-11-03T18:16:30.281Z",
"action": "GLOBAL_POLICY_REVIEW_REQUESTED",
"tenantId": "your-immuta-tenant.com",
"actionStatus": "SUCCESS"
}
- Event:
GlobalPolicyReviewRequested
- Legacy event:
globalPolicyReviewRequested
- Description: An audit event for when a global policy is ready and requests a review in the approve to promote workflow.
GlobalPolicyUpdated event
{
"tenantId": "your-immuta-tenant.com",
"receivedTimestamp": "2023-10-24T18:06:21.278Z",
"eventTimestamp": "2023-10-24T18:06:21.155Z",
"actorIp": "xxx.xx.xx.xx",
"requestId": "c2554ade-fbea-54b4-bfa5-a652d8a34309",
"actionStatus": "SUCCESS",
"relatedResources": [],
"actor": {
"type": "USER_ACTOR",
"name": "Taylor Smith",
"identityProvider": "bim",
"profileId": "1",
"id": "taylor@immuta.com"
},
"id": "f2346f5b-07b3-4f71-a0e1-9635e3b7cacc",
"targetType": "GLOBAL_POLICY",
"targets": [
{
"id": "7",
"policyKey": "mask pii",
"type": "GLOBAL_POLICY",
"name": "Mask PII"
}
],
"action": "UPDATE",
"auditPayload": {
"version": 1,
"policy": {
"circumstance": {
"type": "WHEN_SELECTED"
},
"actions": [
{
"dataPolicyType": "MASKING",
"type": "DATA",
"rules": [
{
"type": "MASKING_HASH",
"columnCondition": {
"tags":