<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Specific audit logs are not being generated. in Data Governance</title>
    <link>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/156439#M2839</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/160826"&gt;@kohei-matsumura&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Yes.. if you want to find changes to account-console roles on a service principal (for example, who has roles/servicePrincipal.manager or roles/servicePrincipal.user), then service_name = 'accountsAccessControl' and action_name = 'updateRuleSet' is the right audit event family to search. The account-console permissions flow for service principals is handled by the Accounts Access Control API, and grant/revoke is done by updating the rule set for that service principal resource.&lt;/P&gt;
&lt;P&gt;But those two predicates alone are too broad if your goal is a specific service principal. They will return all rule-set updates made through the Account Access Control API, not just service-principal-manager changes.&lt;/P&gt;
&lt;P&gt;What else that search can include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;updates to the account rule set: accounts/&amp;lt;ACCOUNT_ID&amp;gt;/ruleSets/default&lt;/LI&gt;
&lt;LI&gt;updates to a group rule set: accounts/&amp;lt;ACCOUNT_ID&amp;gt;/groups/&amp;lt;GROUP_ID&amp;gt;/ruleSets/default&lt;/LI&gt;
&lt;LI&gt;updates to a service principal rule set: accounts/&amp;lt;ACCOUNT_ID&amp;gt;/servicePrincipals/&amp;lt;SP_ID&amp;gt;/ruleSets/default&lt;/LI&gt;
&lt;LI&gt;updates to a tag policy rule set: accounts/&amp;lt;ACCOUNT_ID&amp;gt;/tagPolicies/&amp;lt;TAG_POLICY_ID&amp;gt;/ruleSets/default&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;So for your use case, the better filter is:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;service_name = 'accountsAccessControl'&lt;/LI&gt;
&lt;LI&gt;action_name = 'updateRuleSet'&lt;/LI&gt;
&lt;LI&gt;request_params['account_id'] = '&amp;lt;account-id&amp;gt;'&lt;/LI&gt;
&lt;LI&gt;get_json_object(request_params['name'], '$.name') = 'accounts/&amp;lt;account-id&amp;gt;/servicePrincipals/&amp;lt;sp-id&amp;gt;/ruleSets/default'&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;That narrows the results to updates to that service principal’s rule set specifically. Also note...&amp;nbsp;updateRuleSet is a full replacement of the rule set, not a single "grant one user" delta event. One audit record can therefore represent multiple additions/removals/changes at once, depending on the final contents of request_params['rule_set'].&lt;/P&gt;
&lt;P&gt;If you want to specifically inspect who can manage the SP, look inside the rule set for roles/servicePrincipal.manager. If you also care about who can use it, look for roles/servicePrincipal.user as well.&lt;/P&gt;
&lt;P&gt;Some links if you find them useful..&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.databricks.com/aws/en/dev-tools/cli/reference/account-access-control-commands" target="_blank"&gt;https://docs.databricks.com/aws/en/dev-tools/cli/reference/account-access-control-commands&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.databricks.com/aws/en/security/auth/access-control/service-principal-acl" target="_blank"&gt;https://docs.databricks.com/aws/en/security/auth/access-control/service-principal-acl&lt;/A&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;FONT size="2" color="#FF6600"&gt;&lt;STRONG&gt;&lt;I&gt;If this answer resolves your question, could you mark it as “Accept as Solution”? That helps other users quickly find the correct fix.&lt;/I&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;I&gt;&lt;/I&gt;&lt;/P&gt;
&lt;DIV class="tk0j8o1 _1ibi0s31a _1ibi0s3do"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 May 2026 09:54:10 GMT</pubDate>
    <dc:creator>Ashwin_DSA</dc:creator>
    <dc:date>2026-05-08T09:54:10Z</dc:date>
    <item>
      <title>Specific audit logs are not being generated.</title>
      <link>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/155907#M2830</link>
      <description>&lt;P&gt;I changed the administrative permissions for a specific service principal in the account management screen.&lt;/P&gt;&lt;P&gt;I expected an audit log to be generated with service_name = accountns and action_name = changeServicePrincipalAcls, as described in the audit log reference, but it wasn't generated.&lt;/P&gt;&lt;P&gt;What kind of operation would generate an audit log with service_name = accountns and action_name = changeServicePrincipalAcls?&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="行った操作.png" style="width: 999px;"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/26548i73845E7EFDB5678A/image-size/large?v=v2&amp;amp;px=999" role="button" title="行った操作.png" alt="行った操作.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ログの確認.png" style="width: 999px;"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/26549i042D73B02611E1D8/image-size/large?v=v2&amp;amp;px=999" role="button" title="ログの確認.png" alt="ログの確認.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 09:05:00 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/155907#M2830</guid>
      <dc:creator>kohei-matsumura</dc:creator>
      <dc:date>2026-05-01T09:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: Specific audit logs are not being generated.</title>
      <link>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/155946#M2831</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/160826"&gt;@kohei-matsumura&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;An audit log entry with service_name = accounts and action_name = changeServicePrincipalAcls is generated only when you change the workspace-level ACLs of a service principal... as in... when you use the workspace permissions API/UI to grant or revoke "Service principal user/manager" on that service principal at the workspace level.&lt;/P&gt;
&lt;P&gt;The account console "Permissions" tab you used is backed by the Account Access Control API, which emits service_name = accountsAccessControl, action_name = updateRuleSet, not changeServicePrincipalAcls.&lt;/P&gt;
&lt;P&gt;You may also find &lt;A href="https://docs.databricks.com/aws/en/admin/account-settings/audit-logs" target="_blank"&gt;this&lt;/A&gt; useful.&lt;/P&gt;
&lt;P class="p1"&gt;&lt;FONT size="2" color="#FF6600"&gt;&lt;STRONG&gt;&lt;I&gt;If this answer resolves your question, could you mark it as “Accept as Solution”? That helps other users quickly find the correct fix.&lt;/I&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;I&gt;&lt;/I&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2026 15:35:24 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/155946#M2831</guid>
      <dc:creator>Ashwin_DSA</dc:creator>
      <dc:date>2026-05-01T15:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: Specific audit logs are not being generated.</title>
      <link>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/156437#M2838</link>
      <description>&lt;P&gt;Thank you for your reply. I understand that my criteria were incorrect.&lt;BR /&gt;I want to check if there have been any operations that changed the user or group that can manage the service principal. Is it correct to search using the conditions you suggested, `service_name = accountsAccessControl, action_name = updateRuleSet`?&lt;BR /&gt;Also, what other operations would be included in a search using these conditions?&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2026 08:57:57 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/156437#M2838</guid>
      <dc:creator>kohei-matsumura</dc:creator>
      <dc:date>2026-05-08T08:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: Specific audit logs are not being generated.</title>
      <link>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/156439#M2839</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/160826"&gt;@kohei-matsumura&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Yes.. if you want to find changes to account-console roles on a service principal (for example, who has roles/servicePrincipal.manager or roles/servicePrincipal.user), then service_name = 'accountsAccessControl' and action_name = 'updateRuleSet' is the right audit event family to search. The account-console permissions flow for service principals is handled by the Accounts Access Control API, and grant/revoke is done by updating the rule set for that service principal resource.&lt;/P&gt;
&lt;P&gt;But those two predicates alone are too broad if your goal is a specific service principal. They will return all rule-set updates made through the Account Access Control API, not just service-principal-manager changes.&lt;/P&gt;
&lt;P&gt;What else that search can include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;updates to the account rule set: accounts/&amp;lt;ACCOUNT_ID&amp;gt;/ruleSets/default&lt;/LI&gt;
&lt;LI&gt;updates to a group rule set: accounts/&amp;lt;ACCOUNT_ID&amp;gt;/groups/&amp;lt;GROUP_ID&amp;gt;/ruleSets/default&lt;/LI&gt;
&lt;LI&gt;updates to a service principal rule set: accounts/&amp;lt;ACCOUNT_ID&amp;gt;/servicePrincipals/&amp;lt;SP_ID&amp;gt;/ruleSets/default&lt;/LI&gt;
&lt;LI&gt;updates to a tag policy rule set: accounts/&amp;lt;ACCOUNT_ID&amp;gt;/tagPolicies/&amp;lt;TAG_POLICY_ID&amp;gt;/ruleSets/default&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;So for your use case, the better filter is:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;service_name = 'accountsAccessControl'&lt;/LI&gt;
&lt;LI&gt;action_name = 'updateRuleSet'&lt;/LI&gt;
&lt;LI&gt;request_params['account_id'] = '&amp;lt;account-id&amp;gt;'&lt;/LI&gt;
&lt;LI&gt;get_json_object(request_params['name'], '$.name') = 'accounts/&amp;lt;account-id&amp;gt;/servicePrincipals/&amp;lt;sp-id&amp;gt;/ruleSets/default'&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;That narrows the results to updates to that service principal’s rule set specifically. Also note...&amp;nbsp;updateRuleSet is a full replacement of the rule set, not a single "grant one user" delta event. One audit record can therefore represent multiple additions/removals/changes at once, depending on the final contents of request_params['rule_set'].&lt;/P&gt;
&lt;P&gt;If you want to specifically inspect who can manage the SP, look inside the rule set for roles/servicePrincipal.manager. If you also care about who can use it, look for roles/servicePrincipal.user as well.&lt;/P&gt;
&lt;P&gt;Some links if you find them useful..&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.databricks.com/aws/en/dev-tools/cli/reference/account-access-control-commands" target="_blank"&gt;https://docs.databricks.com/aws/en/dev-tools/cli/reference/account-access-control-commands&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.databricks.com/aws/en/security/auth/access-control/service-principal-acl" target="_blank"&gt;https://docs.databricks.com/aws/en/security/auth/access-control/service-principal-acl&lt;/A&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;FONT size="2" color="#FF6600"&gt;&lt;STRONG&gt;&lt;I&gt;If this answer resolves your question, could you mark it as “Accept as Solution”? That helps other users quickly find the correct fix.&lt;/I&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;I&gt;&lt;/I&gt;&lt;/P&gt;
&lt;DIV class="tk0j8o1 _1ibi0s31a _1ibi0s3do"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2026 09:54:10 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/156439#M2839</guid>
      <dc:creator>Ashwin_DSA</dc:creator>
      <dc:date>2026-05-08T09:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: Specific audit logs are not being generated.</title>
      <link>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/156534#M2840</link>
      <description>&lt;P&gt;Thank you very much!&lt;/P&gt;&lt;P&gt;I understand&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 08:23:35 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-governance/specific-audit-logs-are-not-being-generated/m-p/156534#M2840</guid>
      <dc:creator>kohei-matsumura</dc:creator>
      <dc:date>2026-05-11T08:23:35Z</dc:date>
    </item>
  </channel>
</rss>

