authentication.subject.name field is not available in exports because it can contain email addresses that are Personally Identifiable Information (PII).
Filter operators
Supported operators include:=equals!=not equals:containsregexregular expression match
How to filter events in the web console
To narrow down the events, you can use the following filters:- Event JSONs: Search in JSON field values, but not a full-text search for a substring in the JSON event description. For example, if the JSON contains a
namefield with the valueTest User, this filter findsTest Userbut cannot find"name": "Test User". - Action: Standard actions are
CREATE,UPDATEorDELETE. Actions can differ by service. For example, for Compute resources, you can also specifySTOPandSTART. - Ancestor ID: ID of the resource ancestor, starting from the tenant.
- Ancestor name: Name of the resource ancestor, starting from the tenant.
- Masked token: Access token that was used to authorize the event. You can enter a part of the token here.
- Region: Nebius AI Cloud region in which the event occurred.
- Resource ID: ID of the resource on which actions were performed. For example, a Compute disk (
computedisk-***), a service account (serviceaccount-***), etc. - Resource name: Name of the resource on which actions were performed.
- Resource type: Type of the resource on which actions were performed. For example,
computediskormk8scluster. - Service: Service in which the actions were performed.
- Event class: A string in the
ai.nebius.<service_name>.<resource_type>.<action>format. It includes theai.nebiusprefix and refers to a Nebius AI Cloud service, type of resource in it and the action performed on this resource, for example,ai.nebius.compute.computeinstance.delete. - Static key ID: ID of the static key that was used to authorize the event.
- Status: Status of the operation associated with the event.
- Subject ID: ID of a user account or a service account that performed actions. The formats of user account IDs and service account IDs are
tenantuseraccount-***andserviceaccount-***. - Subject name: Name of a user account or a service account that performed actions. This filter is not available for exports.
= in a filter to choose if the events should contain or exclude the values you enter.
How to filter events by using the CLI
To narrow down the events, you can use one or more of the following filters:-
Resource ID or type
The type or ID of the resource on which actions were performed. ID formats include, for example, a
computeinstance-***for a Compute virtual machine,computedisk-***for a Compute disk,serviceaccount-***for a service account.- View
- Export
-
Resource ancestor ID or name
The ID or name of the resource ancestor, starting from the tenant. For example, you can check all the actions performed on virtual machines in one of your projects by specifying the project ID or name.
- View
- Export
-
Event action
Specify the action:
CREATE,UPDATEorDELETE. Actions can differ by service. For example, for Compute resources, you can also specifySTOPandSTART.- View
- Export
-
Region in which the event occurred.
See the list of Nebius AI Cloud regions.
- View
- Export
-
Service in which the event occurred.
See the list of services.
- View
- Export
-
Event class
A string in the
ai.nebius.<service_name>.<resource_type>.<action>format. It includes theai.nebiusprefix and refers to a Nebius AI Cloud service, type of resource in it and the action performed on this resource, for example,ai.nebius.compute.computeinstance.delete.- View
- Export
-
Subject name or ID
The name or ID of a user account or a service account that performed actions. The formats of user account IDs and service account IDs are
tenantuseraccount-***andserviceaccount-***. Theauthentication.subject.namefilter is not available for exports.- View
- Export
-
Subject credentials
For access tokens, use
authentication.token_credential.masked_tokenwithout a signature. For AWS-compatible access keys, useauthentication.static_key_credential.id.- View
- Export
How to combine filters
To combine filters, use the following instruments:ANDlogical operator.- Comparison operators:
=(equals),!=(not equals),:(contains). - Regular expressions (for example,
regex(resource.name, '^.*prod.*$')to show resources withprodin their names).
Examples
- View
- Export
For example, to view all events where the user
example@nebius.com deleted virtual machines between April 1 and April 5, run: