Skip to main content

Audit log reference

This article provides you with a comprehensive reference of available audit log services and events. By understanding which events are logged in the audit logs, your enterprise can monitor detailed Databricks usage patterns in your account.

To access and query your account's audit logs, use the audit log system table (Public Preview).

Audit log considerations

  • The services in this reference are organized by audit_level, with workspace-level actions presented first and account-level actions following.
  • Because account-level actions aren't specific to a single workspace, the workspace_id in account-level logs is recorded as 0.
  • Most audit logs are only accessible from the region in which they are recorded.

Workspace-level events

The following services log audit events at the workspace level.

Authentication events

These events are related to user authentication.

These events are logged under the service_name of accounts.

action_name

Description

request_params

accountInHouseOAuthClientAuthentication

An OAuth client is authenticated using an in-house OAuth token.

  • user
  • authenticationMethod

accountLoginCodeAuthentication

A user's account login code is authenticated.

  • user

certLogin

A user logs in to Databricks using X509 certification.

  • user

jwtLogin

User logs into Databricks using a JWT.

  • user
  • authenticationMethod

login

User logs into the workspace.

  • user
  • authenticationMethod

logout

User logs out of the workspace.

  • user

mfaAddKey

User registers a new security key.

mfaDeleteKey

User deletes a security key.

  • id

mfaLogin

User logs into Databricks using MFA.

  • user
  • authenticationMethod

mintOAuthAuthorizationCode

An in-house OAuth authorization code is minted.

  • client_id

mintOAuthToken

An in-house OAuth token is minted.

  • grant_type
  • scope
  • expires_in
  • client_id

multiFactorAuthenticationLogin

A user logs in to Databricks using multi-factor authentication.

  • user
  • authenticationMethod

oidcBrowserLogin

A user logs in to Databricks using an OpenID Connect browser workflow.

  • user
  • authenticationMethod

oidcTokenAuthorization

When an API call is authorized through a generic OIDC/OAuth token.

  • user
  • authenticationMethod

samlLogin

User logs in to Databricks through SAML SSO.

  • user
  • authenticationMethod

tokenLogin

A user logs into Databricks using a token.

  • tokenId
  • user
  • authenticationMethod

workspaceLoginCodeAuthentication

A user's workspace-scoped login code is authenticated.

  • user
  • authenticationMethod

User and group management events

These events are related to user and group management.

These events are logged under the service_name of accounts.

action_name

Description

request_params

activateUser

A user is reactivated after being deactivated. See Deactivate users in workspace.

  • targetUserName
  • endpoint
  • targetUserId

add

A user is added to a Databricks workspace.

  • targetUserName
  • endpoint
  • targetUserId

addX509

A user account is added using an X509 certificate for authentication.

addPrincipalToGroup

A user is added to a workspace-level group.

  • targetGroupId
  • endpoint
  • targetUserId
  • targetGroupName
  • targetUserName

addPrincipalsToGroup

Multiple users are added to a workspace-level group.

  • targetGroupId
  • endpoint
  • targetUserId
  • targetGroupName
  • targetUserName

changeDatabricksSqlAcl

A user's Databricks SQL permissions are changed.

  • shardName
  • targetUserId
  • resourceId
  • aclPermissionSet

changeDatabricksWorkspaceAcl

Permissions to a workspace are changed.

  • shardName
  • targetUserId
  • resourceId
  • aclPermissionSet

changeDatabricksWorkspaceDirectoryAcl

Permissions to a workspace directory are changed.

  • shardName
  • targetUserId
  • resourceId
  • aclPermissionSet

changePassword

A user's password is changed.

  • newPasswordSource
  • targetUserId
  • serviceSource
  • wasPasswordChanged
  • userId

changePasswordAcl

Password changing permissions are changed in the account.

  • shardName
  • targetUserId
  • resourceId
  • aclPermissionSet

changeServicePrincipalAcls

When a service principal's permissions are changed.

  • shardName
  • targetServicePrincipal
  • resourceId
  • aclPermissionSet

createGroup

A workspace-level group is created.

  • endpoint
  • targetUserId
  • targetUserName

deactivateUser

A user is deactivated in the workspace. See Deactivate users in workspace.

  • targetUserName
  • endpoint
  • targetUserId

delete

A user is deleted from the Databricks workspace.

  • targetUserId
  • targetUserName
  • endpoint

deleteUser

A user's personally identifiable information is purged after they have not belonged to any running workspaces for at least 7 days.

disableClusterAcls

Cluster access control is disabled for the workspace.

  • shardName
  • endpoint

disableTableAcls

Table access control is disabled for the workspace.

  • shardName
  • endpoint

disableWorkspaceAcls

Workspace access control is disabled for the workspace.

  • shardName
  • endpoint

enableClusterAcls

Cluster access control is enabled for the workspace.

  • shardName
  • endpoint

enableTableAcls

Table access control is enabled for the workspace.

  • shardName
  • endpoint

enableWorkspaceAcls

Workspace access control is enabled for the workspace.

  • shardName
  • endpoint

removeAdmin

A user is revoked of workspace admin permissions.

  • targetUserName
  • endpoint
  • targetUserId

removeGroup

A group is removed from the workspace.

  • targetGroupId
  • targetGroupName
  • endpoint

removePrincipalFromGroup

A user is removed from a group.

  • targetGroupId
  • endpoint
  • targetUserId
  • targetGroupName
  • targetUserName

removePrincipalsFromGroup

Multiple users are removed from a workspace-level group.

  • targetGroupId
  • endpoint
  • targetUserId
  • targetGroupName
  • targetUserName

resetPassword

A user's password is reset.

  • serviceSource
  • userId
  • endpoint
  • targetUserId
  • targetUserName
  • wasPasswordChanged
  • newPasswordSource

setAdmin

A user is granted account admin permissions.

  • endpoint
  • targetUserName
  • targetUserId

updateGroup

A group's properties are updated.

  • endpoint
  • targetGroupId
  • targetGroupName

updateUser

An account admin updates a user's account.

  • targetUserName
  • endpoint
  • targetUserId

usernameDomainDenied

A user sign-up attempt is denied because the email domain is not allowed.

  • targetUserName

validateEmail

When a user validates their email after account creation.

  • endpoint
  • targetUserName
  • targetUserId

Token management events

These events are related to token management.

These events are logged under the service_name of accounts.

action_name

Description

request_params

autoScopeDbToken

A batch operation reduces token scopes as part of automated scope enforcement.

  • token_infos.scope
  • token_infos.token_hash
  • token_partition_id.workspaceId
  • token_partition_id.accountId
  • run_mode

changeDbTokenAcl

Permissions on an access token are changed.

  • shardName
  • targetUserId
  • resourceId
  • aclPermissionSet

changeDbTokenState

A Databricks access token is disabled.

  • tokenHash
  • tokenState
  • userId

garbageCollectDbToken

A user runs a garbage collect command on expired tokens.

  • tokenExpirationTime
  • tokenClientId
  • userId
  • tokenCreationTime
  • tokenFirstAccessed
  • tokenHash

generateDbToken

When someone generates a token from User Settings or when the service generates the token.

  • tokenExpirationTime
  • tokenCreatedBy
  • tokenHash
  • userId

reachMaxQuotaDbToken

When the current number of non-expired tokens exceeds the token quota.

revokeDbToken

A user's token is dropped from a workspace. Can be triggered by a user being removed from the Databricks account.

  • userId
  • tokenHash

revokeOutOfQuotaDbToken

A Databricks access token is revoked because the token quota was exceeded.

updateDbToken

A Databricks access token is updated.

  • token.scopes
  • token_id

updateOnBehalfOfToken

An on-behalf-of token is updated.

  • token.created_by_id
  • token.owner_id
  • token.scopes
  • token.token_id

IP access list events

These events are related to IP access lists.

These events are logged under the service_name of accounts.

action_name

Description

request_params

createIpAccessList

An IP access list is added to the workspace.

  • ipAccessListId
  • userId

deleteIpAccessList

An IP access list is deleted from the workspace.

  • ipAccessListId
  • userId

IpAccessDenied

A user attempts to connect to the service through a denied IP.

  • path
  • user
  • userId

ipAccessListQuotaExceeded

  • userId

updateIpAccessList

An IP access list is changed.

  • ipAccessListId
  • userId

Groups events

These events are logged at the workspace level. This service includes events related to account and workspace groups. These actions are related to legacy ACL groups. For actions related to account- and workspace-level groups, see Authentication events and Account-level authentication events.

These events are logged under the service_name of groups.

action_name

Description

request_params

addPrincipalToGroup

An admin adds a user to a group.

  • user_name
  • parent_name

createGroup

An admin creates a group.

  • group_name

getGroupMembers

An admin views group members.

  • group_name

getGroups

An admin views a list of groups

none

getInheritedGroups

An admin views inherited groups

none

removeGroup

An admin removes a group.

  • group_name

IAM role events

The following event is logged at the workspace level.

These events are logged under the service_name of iamRole.

action_name

Description

request_params

changeIamRoleAcl

A workspace admin changes permissions for an IAM role.

  • targetUserId
  • shardName
  • resourceId
  • aclPermissionSet

AI/BI dashboard events

These events are logged at the workspace level. This service includes events related to AI/BI dashboards.

These events are logged under the service_name of dashboards.

action_name

Description

request_params

getDashboard

A user accesses the draft version of a dashboard either by viewing it in the UI or requesting the dashboard definition using the API. Only workspace users can access the draft version of a dashboard.

  • dashboard_id

getPublishedDashboard

A user accesses the published version of a dashboard by viewing in the UI or requesting the dashboard definition using the API. Includes activity from both workspace users and account users. Excludes receiving a PDF snapshot of a dashboard using scheduled email.

  • dashboard_id
  • credentials_embedded

executeQuery

A user executes a query from a dashboard.

  • dashboard_id
  • statement_id
  • details

cancelQuery

A user cancels a query from a dashboard.

  • dashboard_id
  • statement_id

getQueryResult

A user receives the results of a query from a dashboard.

  • dashboard_id
  • statement_id

triggerDashboardSnapshot

A user downloads a PDF snapshot of a dashboard.

  • dashboard_id
  • name

sendDashboardSnapshot

A PDF snapshot of a dashboard is sent through a scheduled email or notification destination.

The request parameters values depend on the type of recipient. For a Databricks notification destination, only the destination_id is shown. For a Databricks user, the subscriber's user ID and email address are shown. If the recipient is an email address, only the email address is shown.

  • dashboard_id
  • subscriber_destination_id
  • subscriber_user_details.user_id
  • subscriber_user_details.email_address

getDashboardDetails

A user accesses details of a draft dashboard, such as datasets and widgets. getDashboardDetails is always emitted when a user views a draft dashboard using UI or requests the dashboard definition using the API.

  • dashboard_id

createDashboard

A user creates a new AI/BI dashboard using the UI or API.

  • dashboard_id

updateDashboard

A user makes an update to an AI/BI dashboard using the UI or API.

  • dashboard_id

cloneDashboard

A user clones an AI/BI dashboard.

  • source_dashboard_id
  • new_dashboard_id

publishDashboard

A user publishes an AI/BI dashboard with shared or individual data permissions using the UI or API.

  • dashboard_id
  • credentials_embedded
  • warehouse_id

unpublishDashboard

A user unpublishes a published AI/BI dashboard using the UI or API.

  • dashboard_id

trashDashboard

A user moves a dashboard to the trash using the dashboard UI or Lakeview API commands. This event is logged only when performed through these channels, not for workspace actions. To audit workspace actions, see Workspace events.

  • dashboard_id

restoreDashboard

A user restores an AI/BI dashboard from the trash using the dashboard UI or Lakeview API commands. This event is logged only when performed through these channels, not for workspace actions. To audit workspace actions, see Workspace events.

  • dashboard_id

migrateDashboard

A user migrates a DBSQL dashboard to an AI/BI dashboard.

  • source_dashboard_id
  • new_dashboard_id
  • update_parameter_syntax

createSchedule

A user creates an email subscription schedule.

  • dashboard_id
  • schedule_id
  • schedule

updateSchedule

A user makes an update to an AI/BI dashboard's schedule.

  • dashboard_id
  • schedule_id

deleteSchedule

A user deletes an AI/BI dashboard's schedule.

  • dashboard_id
  • schedule_id

createSubscription

A user subscribes an email destination to an AI/BI dashboard schedule.

  • dashboard_id
  • schedule_id
  • schedule

deleteSubscription

A user deletes an email destination from an AI/BI dashboard schedule.

  • dashboard_id
  • schedule_id

Alerts events

Beta

This feature is in Beta. Workspace admins can control access to this feature from the Previews page. See Manage Databricks previews.

These events are logged at the workspace level. This service includes events related to alerts.

note

This service does not record legacy alert events. Legacy alert events are logged under the databrickssql service.

These events are logged under the service_name of alerts.

action_name

Description

request_params

apiCreateAlert

A user creates an alert using the Alerts V2 API.

  • alert.id

apiGetAlert

A user gets an alert using the Alerts V2 API.

  • alert_id

apiTrashAlert

A user deletes an alert using the Alerts V2 API.

  • alert_id

apiUpdateAlert

A user updates an alert using the Alerts V2 API.

  • alert.id

cloneAlert

A user clones an existing alert.

  • alert_id

createAlert

A user creates a new alert.

  • alert_id

getAlert

A user gets information about an alert using the UI.

  • alert_id

previewAlertEvaluate

The Test condition feature returns the results of the alert test.

  • execution_session_id

previewAlertExecute

A user uses the Test condition feature to preview and test their alert.

  • warehouse_id

runNowAlert

A user clicks the Run now button to run the alert query immediately.

  • alert_id

updateAlert

A user updates the details of an alert.

  • alert.id

Clusters events

These events are logged at the workspace level. This service includes events related to classic clusters.

These events are logged under the service_name of clusters.

action_name

Description

request_params

automaticClusterUpdate

A cluster is automatically updated.

  • clusterId

changeClusterAcl

A user changes the cluster ACL.

  • shardName
  • aclPermissionSet
  • targetUserId
  • resourceId

changeOwner

A user changes the owner of a cluster.

  • cluster_id
  • owner_username

create

A user creates a cluster.

  • access_mode
  • acl_path_prefix
  • apply_policy_default_values
  • assigned_principal
  • autoscale
  • autotermination_minutes
  • aws_attributes
  • budget_policy_id
  • clone_from
  • cluster_creator
  • cluster_log_conf
  • cluster_name
  • cluster_source
  • cpu_architecture
  • custom_tags
  • data_security_mode
  • disk_spec
  • docker_image
  • driver_instance_pool_id
  • driver_instance_source
  • driver_node_type_id
  • effective_spark_version
  • enable_elastic_disk
  • enable_jobs_autostart
  • enable_local_disk_encryption
  • enable_serverless_compute
  • idempotency_token
  • init_scripts
  • instance_pool_id
  • instance_source
  • is_single_node
  • kind
  • nephos_virtual_driver_size
  • nephos_virtual_worker_size
  • no_driver_daemon
  • node_type_id
  • num_workers
  • organization_id
  • performance_target
  • platform_channel
  • policy_id
  • runtime_engine
  • single_user_name
  • spark_conf
  • spark_env_vars
  • spark_image_key
  • spark_version
  • ssh_public_keys
  • start_cluster
  • use_ml_runtime
  • user_id
  • validate_cluster_name_uniqueness
  • virtual_cluster_size
  • workload_type

createResult

Results from cluster creation. In conjunction with create.

  • clusterName
  • clusterState
  • clusterId
  • clusterTerminationReasonCode
  • clusterWorkers
  • clusterOwnerUserId

delete

A cluster is terminated.

  • cluster_id
  • termination_reason

deleteResult

Results from cluster termination. In conjunction with delete.

  • clusterName
  • clusterState
  • clusterId
  • clusterTerminationReasonCode
  • clusterWorkers
  • clusterOwnerUserId

edit

A user makes changes to cluster settings. This logs all changes except for changes in cluster size or autoscaling behavior.

  • acl_path_prefix
  • apply_policy_default_values
  • assigned_principal
  • autoscale
  • autotermination_minutes
  • aws_attributes
  • cluster_creator
  • cluster_id
  • cluster_log_conf
  • cluster_name
  • cluster_source
  • custom_tags
  • data_security_mode
  • docker_image
  • driver_instance_pool_id
  • driver_node_type_id
  • effective_spark_version
  • enable_elastic_disk
  • enable_local_disk_encryption
  • idempotency_token
  • init_scripts
  • instance_pool_id
  • is_single_node
  • kind
  • no_driver_daemon
  • node_type_id
  • num_workers
  • organization_id
  • policy_id
  • runtime_engine
  • single_user_name
  • spark_conf
  • spark_env_vars
  • spark_version
  • ssh_public_keys
  • start_cluster
  • use_ml_runtime
  • user_id
  • validate_cluster_name_uniqueness
  • virtual_cluster_size
  • workload_type

permanentDelete

A cluster is deleted from the UI.

  • cluster_id

resize

Cluster resizes. This is logged on running clusters where the only property that changes is either the cluster size or autoscaling behavior.

  • avoid_containers
  • autoscale
  • cluster_id
  • num_workers

resizeResult

Results from cluster resize. In conjunction with resize.

  • clusterName
  • clusterState
  • clusterId
  • clusterWorkers
  • clusterOwnerUserId

restart

A user restarts a running cluster.

  • cluster_id

restartResult

Results from cluster restart. In conjunction with restart.

  • clusterName
  • clusterState
  • clusterId
  • clusterTerminationReasonCode
  • clusterWorkers
  • clusterOwnerUserId

start

A user starts a cluster.

  • cluster_id
  • init_scripts_safe_mode

startResult

Results from cluster start. In conjunction with start.

  • clusterName
  • clusterState
  • clusterId
  • clusterTerminationReasonCode
  • clusterWorkers
  • clusterOwnerUserId

Cluster libraries events

These events logged at the workspace level. This service includes events related to compute-scoped libraries.

These events are logged under the service_name of clusterLibraries.

action_name

Description

request_params

installLibraries

User installs a library on a cluster.

  • cluster_id
  • libraries
  • are_installed_via_policy
  • replace

uninstallLibraries

User uninstalls a library on a cluster.

  • cluster_id
  • libraries

Cluster policy events

These events are logged at the workspace level. This service includes events related to compute policies.

These events are logged under the service_name of clusterPolicies.

action_name

Description

request_params

create

A user created a cluster policy.

  • name
  • libraries
  • max_clusters_per_user
  • policy_family_id
  • policy_family_version

edit

A user edited a cluster policy.

  • policy_id
  • name
  • libraries
  • max_clusters_per_user
  • policy_family_id
  • policy_family_version

delete

A user deleted a cluster policy.

  • policy_id

changeClusterPolicyAcl

A workspace admin changes permissions for a cluster policy.

  • shardName
  • targetUserId
  • resourceId
  • aclPermissionSet

Genie chat events

These events are logged at the workspace level. This service covers Genie chat conversation tooling and internal RPCs. It is separate from the aibiGenie service, which covers Genie Spaces.

These events are logged under the service_name of genieChat.

action_name

Description

request_params

cancelGenieChatConversation

A user cancels an in-progress Genie chat conversation.

  • conversation_id

createScheduledTask

A user creates a scheduled Genie chat task.

  • parent_asset_name

deleteGenieChatConversation

A user deletes a Genie chat conversation.

  • conversation_id

deleteGenieChatWorkspaceData

An administrator deletes all Genie chat data associated with a workspace.

deleteScheduledTask

A user deletes a scheduled Genie chat task.

  • insight_id
  • name

getGenieChatConversation

A user retrieves a Genie chat conversation.

  • conversation_id

getScheduledTask

A user retrieves a scheduled Genie chat task.

  • insight_id
  • name

mcpProxy

A user invokes a tool on an MCP (Model Context Protocol) server through Databricks.

mcpToolInvocation

The Genie agent invokes an MCP tool. One event is logged per tool call.

steerGenieChatConversation

A user steers a Genie chat conversation.

  • conversation_id

updateGenieChatConversationFeedback

A user submits feedback on a Genie chat conversation.

  • conversation_id

updateGenieChatConversationShare

A user updates the sharing settings of a Genie chat conversation.

  • conversation_id
  • share.acl.allow_account

updateScheduledTask

A user updates a scheduled Genie chat task.

  • insight_id
  • scheduled_insight.name

Genie Space events

These events are logged at the workspace level. This service includes events related to Genie Spaces.

These events are logged under the service_name of aibiGenie.

action_name

Description

request_params

createSpace

A user creates a new Genie Space. The space_id of the new space is logged in the response column.

createFile

A user uploads a new file to a Genie conversation

  • space_id
  • conversation_id

deleteFile

A user deletes a file from a Genie conversation

  • space_id
  • instruction_id

getSpace

A user accesses the Genie Space.

  • space_id

listSpaces

A user lists all available Genie Spaces.

updateSpace

A user updates the settings of a Genie Space. This can include the title, description, warehouse, tables, sample questions, and the Run as setting, which determines if a shared space embeds the publisher's credentials or authenticates with the viewer's credentials.

  • space_id
  • display_name
  • description
  • warehouse_id
  • table_identifiers
  • run_as_type

trashSpace

A Genie Space is moved to trash.

  • space_id

cloneSpace

A user clones a Genie Space.

  • space_id

addDataSources

A user adds data sources to a Genie Space.

  • space_id

removeDataSources

A user removes data sources from a Genie Space.

  • space_id

updateGenieColumnConfigs

A user updates column configurations for a Genie Space, including visibility, indexing, and sampling settings.

  • space_id
  • column_configs

genieGetSpace

A user accesses details about a Genie Space using the API.

  • space_id

createConversation

A user creates a new conversation thread in the Genie Space.

  • space_id

listConversations

A user opens the list of conversations in the Genie Space.

  • space_id

genieStartConversationMessage

A user starts a conversation thread with a message using the API.

  • space_id
  • conversation_id

getConversation

A user opens a conversation thread in the Genie Space.

  • conversation_id
  • space_id

updateConversation

A user updates a conversation thread's title.

  • conversation_id
  • space_id

deleteConversation

A user deletes a conversation thread in the Genie Space.

  • conversation_id
  • space_id

listConversationShares

A user accesses the list of shares for a conversation.

  • conversation_id
  • space_id

getConversationShare

A user accesses the details of a conversation share.

  • conversation_id
  • share_id
  • space_id

updateConversationShare

A user updates the sharing settings of a conversation.

  • conversation_id
  • share_id
  • space_id

createConversationMessage

A user submits a new message to the Genie Space.

  • conversation_id
  • space_id

genieCreateConversationMessage

A user creates a new message in a conversation using the API.

  • conversation_id
  • space_id
  • message_id

getConversationMessage

A user accesses a message in the Genie Space.

  • conversation_id
  • space_id
  • message_id

genieGetConversationMessage

A user retrieves a specific message in a conversation using the API.

  • conversation_id
  • space_id
  • message_id

deleteConversationMessage

A user deletes an existing message.

  • conversation_id
  • space_id
  • message_id

regenerateConversationMessage

A user regenerates a message response.

  • conversation_id
  • message_id
  • space_id

updateConversationMessage

A user updates an existing message.

  • conversation_id
  • message_id
  • space_id

updateConversationMessageFeedback

A user submits a feedback rating on a message.

  • conversation_id
  • feedback_rating
  • message_id
  • space_id

createConversationMessageAttachment

A user creates an attachment on a message.

  • conversation_id
  • message_id
  • space_id

updateMessageAttachment

A user updates an attachment on a message.

  • conversation_id
  • space_id
  • message_id
  • attachment_id

cancelMessage

A user cancels a running message in a Genie Space.

  • conversation_id
  • message_id
  • space_id

listGenieSpaceMessages

A user accesses the list of messages in a Genie Space.

  • space_id

listGenieSpaceUserMessages

A user accesses the list of their own messages in a Genie Space.

  • space_id

getConversationFileUploadJob

A user checks the status of a file upload job in a conversation.

  • space_id
  • conversation_id
  • job_id

genieGetMessageQueryResult

Genie retrieves the query results associated with a message using the API.

  • conversation_id
  • space_id, message_id

genieGetMessageAttachmentQueryResult

A user retrieves the query results for message attachments using the API.

  • conversation_id
  • space_id
  • attachment_id

executeFullQueryResult

A user retrieves the full query results using the API (up to ~1GB in size).

  • space_id
  • conversation_id
  • message_id

genieExecuteMessageQuery

Genie executes generated SQL to return query results, including refresh data actions using the API.

  • conversation_id
  • space_id
  • message_id

genieExecuteMessageAttachmentQuery

Genie executes a query for message attachment results using the API.

  • conversation_id
  • space_id
  • message_id
  • attachment_id

getMessageQueryResult

Genie retrieves the query results associated with a message.

  • conversation_id
  • space_id, message_id

executeQuery

A user executes a query in a Genie Space.

  • space_id

getQueryResult

A user retrieves query results from a Genie Space.

  • space_id

executeMessageQuery

A user executes a query associated with a message.

  • conversation_id
  • space_id
  • message_id

executeMessageAttachmentQuery

A user executes a query for a message attachment.

  • conversation_id
  • space_id
  • message_id
  • attachment_id

getMessageAttachmentQueryResult

A user retrieves query results for a message attachment.

  • conversation_id
  • space_id
  • message_id
  • attachment_id

summarizeSqlExecutionResults

Genie summarizes the results of a SQL query execution.

  • conversation_id
  • message_id
  • space_id

cancelStatement

A user cancels a running SQL statement in a Genie Space.

  • space_id

createInstruction

A user creates an instruction for a Genie Space.

  • space_id
  • instruction_type

listInstructions

A user navigates to the Instructions tab or the Data tab.

  • space_id
  • conversation_id (Only used when listing fileinstructions in a conversation.)

updateInstruction

A user updates an instruction for a Genie Space.

  • space_id
  • instruction_id

deleteInstruction

A user deletes an instruction for a Genie Space.

  • space_id
  • instruction_id

updateSampleQuestions

A user updates the default sample questions for the space.

  • space_id

createCuratedQuestion

A user creates a sample question or benchmark question.

  • space_id

deleteCuratedQuestion

A user deletes a sample question or benchmark question.

  • space_id
  • curated_question_id

listCuratedQuestions

A user accesses the list of sample questions or benchmark questions in a space. This is logged whenever users open a new chat, view benchmarks, or add sample questions.

  • space_id

updateCuratedQuestion

A user updates a sample question or benchmark question.

  • space_id
  • curated_question_id

createEvaluationResult

Genie creates an evaluation result for a specific question in a benchmark run.

  • space_id
  • eval_id

getEvaluationResult

A user accesses the results for a specific question in a benchmark run.

  • space_id
  • eval_id

getEvaluationResultDetails

A user accesses the query results for a specific question in a benchmark run.

  • space_id
  • eval_id

updateEvaluationResult

A user updates their evaluation result for a specific question.

  • space_id
  • eval_id

createEvaluationRun

A user creates a new benchmark run.

  • space_id

listEvaluationResults

A user accesses the list of results for an benchmark run.

  • space_id
  • run_id

listEvaluationRuns

A user accesses the list of all benchmark runs.

  • space_id

getEvaluationRun

A user accesses the details of a specific benchmark run.

  • run_id
  • space_id

cancelEvaluationRun

A user cancels a running benchmark run.

  • space_id
  • run_id

resumeEvaluationRun

A user resumes a previously canceled benchmark run.

  • space_id
  • run_id

deleteEvaluationRun

A user deletes an benchmark run.

  • space_id
  • run_id

startBenchmarkSuggestions

A user starts generating benchmark suggestions for a Genie Space.

  • space_id

getBenchmarkDebug

A user accesses debug information for a specific benchmark result.

  • space_id
  • run_id
  • result_id

createConversationMessageComment

A user adds a feedback comment to a message.

  • conversation_id
  • space_id
  • message_id

listConversationMessageComments

A user accesses a list of the feedback comments from a space.

  • space_id
  • conversation_ids
  • message_ids
  • user_ids
  • comment_types

deleteConversationMessageComment

A user deletes a feedback comment added to a message.

  • conversation_id
  • space_id
  • message_id
  • message_comment_id

Instance pool events

These events are logged at the workspace level. This service includes events related to pools.

These events are logged under the service_name of instancePools.

action_name

Description

request_params

changeInstancePoolAcl

A user changes an instance pool's permissions.

  • shardName
  • resourceId
  • targetUserId
  • aclPermissionSet

create

A user creates an instance pool.

  • aws_attributes
  • custom_tags
  • disk_spec
  • enable_elastic_disk
  • idle_instance_autotermination_minutes
  • instance_pool_name
  • max_capacity
  • min_idle_instances
  • node_type_flexibility
  • node_type_id
  • preloaded_docker_images
  • preloaded_spark_versions

delete

A user deletes an instance pool.

  • instance_pool_id

edit

A user edits an instance pool.

  • aws_attributes
  • custom_tags
  • disk_spec
  • enable_elastic_disk
  • idle_instance_autotermination_minutes
  • instance_pool_id
  • instance_pool_name
  • max_capacity
  • min_idle_instances
  • node_type_flexibility
  • node_type_id
  • preloaded_docker_images
  • preloaded_spark_versions

Job events

These events are logged at the workspace level. This service includes events related to jobs.

These events are logged under the service_name of jobs.

action_name

Description

request_params

cancel

A job run is cancelled.

  • run_id

cancelAllRuns

A user cancels all runs on a job.

  • all_queued_runs
  • job_id

changeJobAcl

A user updates permissions on a job.

  • shardName
  • aclPermissionSet
  • resourceId
  • targetUserId

create

A user creates a job.

  • budget_policy_id
  • compute
  • continuous
  • create_as_untouched
  • deployment
  • description
  • edit_mode
  • email_notifications
  • environments
  • existing_cluster_id
  • git_source
  • health
  • idempotency_token
  • job_clusters
  • job_type
  • libraries
  • max_concurrent_runs
  • max_retries
  • min_retry_interval_millis
  • name
  • new_cluster
  • notebook_task
  • notification_settings
  • parameters
  • performance_target
  • queue
  • retry_on_timeout
  • run_as
  • run_as_user_name
  • schedule
  • spark_jar_task
  • spark_python_task
  • spark_submit_task
  • tags
  • tasks
  • timeout_seconds
  • trigger
  • webhook_notifications

delete

A user deletes a job.

  • job_id

deleteRun

A user deletes a job run.

  • run_id
  • job_id

deleteTaskValues

A user deletes task values for a job run.

  • ids

getRunOutput

A user makes an API call to get a run output.

  • run_id
  • is_from_webapp
  • notebook_output_limit
  • skip_additional_acl_checks

repairRun

A user repairs a job run.

  • run_id
  • latest_repair_id
  • rerun_tasks
  • rerun_all_failed_tasks
  • rerun_dependent_tasks
  • job_parameters

reset

A job is reset.

  • job_id
  • new_settings

resetJobAcl

A user requests the change of a job's permissions.

  • grants
  • job_id

runCommand

Available when verbose audit logs are enabled. Emitted after a command in a notebook is executed by a job run. A command corresponds to a cell in a notebook.

  • jobId
  • runId
  • notebookId
  • executionTime
  • status
  • commandId
  • commandText
  • clusterId
  • commandLanguage

runFailed

A job run fails or is canceled.

  • jobClusterType
  • jobTriggerType
  • jobId
  • jobTaskType
  • runId
  • jobTerminalState
  • idInJob
  • orgId
  • runCreatorUserName
  • clusterId
  • jobRunId
  • multitaskParentRunId
  • parentRunId
  • repairId
  • taskDependencies
  • taskDependencyType
  • taskKey

runNow

A user triggers an on-demand job run.

  • notebook_params
  • job_id
  • jar_params
  • workflow_context
  • job_parameters
  • idempotency_token
  • only
  • performance_target
  • pipeline_params
  • python_params
  • queue

runStart

Emitted when a job run starts after validation and cluster creation. The request parameters emitted from this event depend on the type of tasks in the job. In addition to the parameters listed, they can include:

- dashboardId (for a SQL dashboard task)
- filePath (for a SQL file task)
- notebookPath (for a notebook task)
- mainClassName (for a Spark JAR task)
- pythonFile (for a Spark JAR task)
- projectDirectory (for a dbt task)
- commands (for a dbt task)
- packageName (for a Python wheel task)
- entryPoint (for a Python wheel task)
- pipelineId (for a pipeline task)
- queryIds (for a SQL query task)
- alertId (for a SQL alert task)

  • taskDependencies
  • multitaskParentRunId
  • orgId
  • idInJob
  • jobId
  • jobTerminalState
  • taskKey
  • jobTriggerType
  • jobTaskType
  • runId
  • runCreatorUserName

runSucceeded

A job run is successful.

  • idInJob
  • jobId
  • jobTriggerType
  • orgId
  • runId
  • jobClusterType
  • jobTaskType
  • jobTerminalState
  • runCreatorUserName
  • clusterId
  • jobRunId
  • multitaskParentRunId
  • parentRunId
  • repairId
  • taskDependencies
  • taskDependencyType
  • taskKey

runTriggered

A job schedule is triggered automatically according to its schedule or trigger.

  • jobId
  • jobTriggeredType
  • runId
  • jobTriggerType
  • runCreatorUserName

sendRunWebhook

A webhook is sent either when the job begins, completes, or fails.

  • orgId
  • jobId
  • jobWebhookId
  • jobWebhookEvent
  • runId

setTaskValue

A user sets values for a task.

  • run_id
  • key

submitRun

A user submits a one-time run via the API.

  • run_name
  • spark_python_task
  • existing_cluster_id
  • notebook_task
  • timeout_seconds
  • libraries
  • new_cluster
  • spark_jar_task
  • access_control_list
  • email_notifications
  • git_source
  • idempotency_token
  • run_as
  • tasks
  • workflow_context

update

A user edits a job's settings.

  • job_id
  • fields_to_remove
  • new_settings

Lakeflow Spark Declarative Pipelines events

These events are logged at the workspace level. This service includes events related to Lakeflow Spark Declarative Pipelines.

These events are logged under the service_name of deltaPipelines.

action_name

Description

request_params

changePipelineAcls

A user changes permissions on a pipeline.

  • aclPermissionSet
  • resourceId
  • shardName
  • targetUserId

create

A user creates a declarative pipeline.

  • allow_duplicate_names
  • budget_policy_id
  • catalog
  • channel
  • clusters
  • configuration
  • continuous
  • data_sampling
  • dbr_version
  • deployment
  • development
  • dry_run
  • edition
  • email_notifications
  • event_log
  • event_log_spec
  • filters
  • gateway_definition
  • id
  • ingestion_definition
  • libraries
  • managed_definition
  • name
  • notifications
  • photon
  • pipeline_type
  • restart_window
  • run_as
  • schema
  • serverless
  • storage
  • tags
  • target
  • trigger

delete

A user deletes a declarative pipeline.

  • cascade
  • pipeline_id

edit

A user edits a declarative pipeline.

  • allow_duplicate_names
  • budget_policy_id
  • catalog
  • channel
  • clusters
  • configuration
  • continuous
  • data_sampling
  • dbr_version
  • deployment
  • development
  • edition
  • email_notifications
  • event_log
  • event_log_spec
  • expected_last_modified
  • filters
  • gateway_definition
  • id
  • ingestion_definition
  • libraries
  • managed_definition
  • name
  • notifications
  • photon
  • pipeline_id
  • pipeline_type
  • restart_window
  • run_as
  • schema
  • serverless
  • storage
  • tags
  • target
  • trigger

startUpdate

A user restarts a declarative pipeline.

  • cause
  • development
  • explore_only
  • full_refresh
  • full_refresh_selection
  • idempotency_token
  • job_task
  • pipeline_id
  • refresh_selection
  • reset_checkpoint_selection
  • update_cause_details
  • usage_policy_id
  • validate_only

stop

A user stops a declarative pipeline.

  • pipeline_id

Lakebase events

These events are logged at the workspace level. This service includes events related to Lakebase.

These events are logged under the service_name of databaseInstances.

action_name

Description

request_params

createDatabaseInstance

A user creates a new database instance.

  • name
  • capacity

getDatabaseInstance

A user queries for a database instance.

  • name

listDatabaseInstance

A user queries for all database instances.

none

updateDatabaseInstance

A user updates properties on an existing instance. For example, its capacity or whether it is paused.

  • capacity
  • stopped

deleteDatabaseInstance

A user hard deletes an instance.

  • name
  • force
  • purge

changeDatabaseInstanceAcl

A user modifies permissions on a database instance.

none

createDatabaseCatalog

A user creates and registers a catalog in Unity Catalog for an existing database.

  • name
  • database_name
  • database_instance_name

deleteDatabaseCatalog

A user unregisters a registered catalog from Unity Catalog.

  • name

getDatabaseCatalog

A user queries for a database catalog.

  • name

createDatabaseTable

A user creates a table inside a database on a database instance.

  • name
  • database_instance_name
  • database_name

getDatabaseTable

A user queries for a database table.

  • name

deleteDatabaseTable

A user deletes a database table from Unity Catalog.

  • name

createSyncedDatabaseTable

A user creates a synced table inside a database on a database instance.

  • name
  • spec
  • scheduling_policy
  • source_table_full_name
  • primary_key_columns

getSyncedDatabaseTable

A user queries for a synced table.

  • name

deleteSyncedDatabaseTable

A user deletes a synced table from Unity Catalog.

  • name

Cloud storage metadata events

These events are logged at the workspace level. This service includes events related to cloud storage metadata operations used by Auto Loader and file arrival triggers.

These events are logged under the service_name of cloudStorageMetadata.

action_name

Description

request_params

listObjects

A user or Auto Loader job fetches a paginated list of file changes (new, updated, or deleted files) from a cloud storage location or Unity Catalog volume. Clients use continuation tokens to incrementally fetch only files that changed since their last read.

  • uri: Cloud storage path
  • continuation_token: Opaque pagination token from a previous response
  • max_objects: Maximum objects to return (default 1,000, capped at 10,000)
  • include_updates: Whether to include updated objects (not just newly created objects)
  • include_deletes: Whether to include deleted objects
  • until_continuation_token: Optional upper-bound token at which to stop reading
  • omit_objects: If true, returns only count without object details
  • include_oldest_object_age: Whether to include the age of the oldest listed object
  • include_earliest_ingestion_time: Whether to include the earliest ingestion timestamp
  • workload_id: Workload identifier
  • caller_context_entries: Caller-provided context IDs for observability (for example, job_id, pipeline_id, run_id)

validateFileEventsPermissions

Validates that credentials and cloud resources (queues, subscriptions) are properly configured for file event notifications on a cloud storage location. Called when a user enables managed file notifications for an external location in Unity Catalog.

  • url: Cloud storage path to validate
  • credential_name: Name of the Unity Catalog storage credential to validate
  • provided_sqs: User-provided AWS SQS queue
  • provided_aqs: User-provided Azure Queue Storage
  • provided_pubsub: User-provided GCP Pub/Sub
  • managed_sqs: Databricks-managed AWS SQS
  • managed_aqs: Databricks-managed Azure Queue Storage
  • managed_pubsub: Databricks-managed GCP Pub/Sub

Ingestion events

The following event is logged at the workspace level and is related to file uploads.

These events are logged under the service_name of ingestion.

action_name

Description

request_params

proxyFileUpload

A user uploads a file to their Databricks workspace.

  • x-databricks-content-length-0
  • x-databricks-total-files

Lineage tracking events

These events are logged at the workspace level. This service includes events related to data lineage.

These events are logged under the service_name of lineageTracking.

action_name

Description

request_params

listColumnLineages

A user accesses the list of the upstream or downstream columns of a column.

  • table_name
  • column_name
  • lineage_direction: The lineage direction (UPSTREAM or DOWNSTREAM).

listSecurableLineagesBySecurable

A user accesses the list of the upstream or downstream securables of a securable.

  • securable_full_name
  • securable_type
  • lineage_direction: The lineage direction (UPSTREAM or DOWNSTREAM).
  • metastore_id
  • page_size
  • page_token
  • securable_response_filter
  • start_timestamp
  • subsecurable_id
  • workspace_id

listEntityLineagesBySecurable

A user accesses the list of entities (notebooks, jobs, etc.) that write to or read a securable.

  • securable_full_name
  • securable_type
  • lineage_direction: The lineage direction (UPSTREAM or DOWNSTREAM).
  • entity_response_filter: The entity type (notebook, job, dashboard, pipeline, query, serving endpoint, etc.).
  • metastore_id
  • page_size
  • start_timestamp
  • subsecurable_id
  • workspace_id

getColumnLineages

A user gets the column lineages for a table and its column.

  • table_name
  • column_name
  • metastore_id
  • only_downstream
  • only_upstream
  • workspace_id

getTableEntityLineages

A user gets the upstream and downstream lineages of a table.

  • table_name
  • include_entity_lineage
  • include_downstream
  • include_upstream
  • metastore_id
  • workspace_id

getJobTableLineages

A user gets the upstream and downstream table lineages of a job.

  • job_id
  • max_result
  • metastore_id
  • workspace_id

getFunctionLineages

A user gets the upstream and downstream securables and entities (notebooks, jobs, etc.) of a function.

  • function_name

getModelVersionLineages

A user gets the upstream and downstream securables and entities (notebooks, jobs, etc.) of a model and its version.

  • model_name
  • version
  • metastore_id
  • workspace_id

getEntityTableLineages

A user gets the upstream and downstream tables of an entity (notebooks, jobs, etc.).

  • entity_type
  • entity_id
  • max_downstreams
  • max_upstreams
  • metastore_id
  • workspace_id

getFrequentlyJoinedTables

A user gets the frequently joined tables for a table.

  • table_name
  • include_columns
  • limit_size
  • metastore_id
  • workspace_id

getFrequentQueryByTable

A user gets the frequent queries for a table.

  • source_table_name
  • limit_size
  • metastore_id
  • workspace_id

getFrequentUserByTable

A user gets the frequent users for a table.

  • table_name
  • limit_size
  • metastore_id
  • workspace_id

getTablePopularityByDate

A user gets the popularity (query count) for a table for the past month.

  • table_name
  • metastore_id
  • workspace_id

getPopularEntities

A user gets the popular entities (notebooks, jobs, etc.) for a table.

  • scope: Specifies the scope for retrieving popular entities, either from the workspace or table name.
  • table_name
  • limit_size
  • metastore_id
  • workspace_id

getPopularTables

A user gets the table popularity info for a list of tables.

  • scope: Specifies the scope for retrieving popular tables, either from the metastore or the table list.
  • table_name_list
  • metastore_id
  • workspace_id

listCustomLineages

A user lists custom lineages for an entity.

  • entity_id
  • lineage_direction
  • metastore_id
  • page_size
  • workspace_id

listSecurableByEntityEvent

A user lists securables associated with entity events.

  • entity_id
  • entity_type
  • lineage_direction
  • metastore_id
  • page_size
  • page_token
  • securable_response_filter
  • start_timestamp
  • workspace_id

Data monitoring events

These events are logged at the workspace level. This service includes events related to Data Quality Monitoring.

These events are logged under the service_name of dataMonitoring.

action_name

Description

request_params

CancelRefresh

User cancels a monitor refresh.

  • full_table_name_arg
  • refresh_id

CreateMonitor

User creates a monitor.

  • data_classification_config
  • full_table_name_arg
  • assets_dir
  • schedule
  • output_schema_name
  • notifications
  • inference_log
  • custom_metrics
  • slicing_exprs
  • snapshot
  • time_series

DeleteMonitor

User deletes a monitor.

  • full_table_name_arg

RegenerateDashboard

User regenerates a monitor dashboard.

  • full_table_name_arg

RunRefresh

Monitor is refreshed, either by schedule or manually.

  • full_table_name_arg

UpdateMonitor

User makes an update to a monitor.

  • data_classification_config
  • table_name
  • full_table_name_arg
  • drift_metrics_table_name
  • dashboard_id
  • custom_metrics
  • assets_dir
  • monitor_version
  • profile_metrics_table_name
  • baseline_table_name
  • status
  • output_schema_name
  • inference_log
  • slicing_exprs
  • latest_monitor_failure_msg
  • notifications
  • schedule
  • snapshot

Request for access events

These events are logged at the workspace level. This service includes events related to access request destinations (Public Preview).

These events are logged under the service_name of request-for-access.

action_name

Description

request_params

updateAccessRequestDestinations

A user updates access request destinations for a Unity Catalog securable.

  • destinations
  • securable

getAccessRequestDestinations

A user gets access request destinations for a Unity Catalog securable.

  • full_name
  • securable_type

listDestinations

A user gets access request destinations for a Unity Catalog securable. This is a legacy version of the getAccessRequestDestinations action.

  • securable

getStatus

A user gets status information for a Unity Catalog securable. Request for access is considered enabled for a Unity Catalog securable if at least one access request destination exists.

  • securable

batchCreateAccessRequests

A user requests access for one or more Unity Catalog securables.

  • requests

requestAccess

A user requests access for a single Unity Catalog securable. This is a legacy version of the batchCreateAccessRequests action.

  • behalf_of
  • comment
  • privileges
  • securable

updateDefaultDestinationStatus

A user updates the status of a workspace-level setting that controls whether all Unity Catalog securables have a default destination assigned.

none

getDefaultDestinationStatus

A user gets the status of the default destination setting.

none

Domains events

These events are logged at the workspace level. This service includes events related to Domains.

These events are logged under the service_name of domains.

action_name

Description

request_params

createDomain

User creates a domain.

  • domain_id
  • draft
  • icon
  • tag_key

updateDomain

User updates a domain.

  • domain_id
  • draft
  • icon

deleteDomain

User deletes a domain.

  • domain_id

listDomains

User lists available domains.

Discover Page events

These events are logged at the workspace level. This service includes events related to the Discover Page.

These events are logged under the service_name of discover.

action_name

Description

request_params

getDiscoverPageDraft

User retrieves the draft version of the Discover Page.

  • name

getDiscoverPagePublished

User retrieves the published version of the Discover Page.

  • name

updateDiscoverPageDraft

User updates the draft version of the Discover Page.

  • name
  • sections

updateDiscoverPagePublished

User updates the published version of the Discover Page.

  • name
  • sections

Uniform Iceberg REST API events

These events are logged at the workspace level. These events are logged when users interact with managed Apache Iceberg tables using an external Iceberg-compatible engine that supports the Iceberg REST Catalog API.

These events are logged under the service_name of uniformIcebergRestCatalog.

action_name

Description

request_params

config

User gets a catalog configuration.

  • http_method
  • http_path

createNamespace

User creates a namespace, with an optional set of properties.

  • http_method
  • http_path

createTable

User creates a new Iceberg table.

  • http_method
  • http_path

deleteNamespace

User deletes an existing namespace.

  • http_method
  • http_path

deleteTable

User deletes an existing table.

  • http_method
  • http_path

getNamespace

User gets properties of a namespace.

  • http_method
  • http_path

listNamespaces

User makes a call to list all namespaces at a specified level.

  • http_method
  • http_path

listTables

User lists all tables under a given namespace.

  • http_method
  • http_path

loadTableCredentials

User loads vended credentials for a table from the catalog.

  • http_method
  • http_path

loadTable

User loads a table from the catalog.

  • http_method
  • http_path

loadView

User loads a view from the catalog.

  • http_method
  • http_path

namespaceExists

User checks if a namespace exists.

  • http_method
  • http_path

renameTable

User renames an existing table

  • http_method
  • http_path

reportMetrics

User sends a metrics report

  • http_method
  • http_path

tableExists

User checks if a table exists within a given namespace.

  • http_method
  • http_path

updateNamespaceProperties

User updates properties for a namespace.

  • http_method
  • http_path

updateTable

User updates table metadata.

  • http_method
  • http_path

viewExists

User checks if a view exists within a given namespace.

  • http_method
  • http_path

Predictive optimization events

These events are logged at the workspace level. This service includes events related to predictive optimization.

These events are logged under the service_name of predictiveOptimization.

action_name

Description

request_params

PutMetrics

Recorded when predictive optimization updates table and workload metrics so the service can more intelligently schedule optimization operations.

  • table_metrics_list
  • start_time
  • end_time

DBFS events

These events are logged at the workspace level. This service includes events related to DBFS.

There are two types of DBFS events: API calls and operational events.

DBFS API events

These audit events are only logged when written through the DBFS REST API.

These events are logged under the service_name of dbfs.

action_name

Description

request_params

addBlock

User appends a block of data to the stream. This is used in conjunction with dbfs/create to stream data to DBFS.

  • handle
  • data_length

close

User closes a stream specified by the input handle.

  • handle

create

User opens a stream to write a file to DBFS.

  • path
  • bufferSize
  • overwrite

delete

User deletes the file or directory from DBFS.

  • recursive
  • path

getStatus

User gets information for a file or directory.

  • path

mkdirs

User creates a new DBFS directory.

  • path

move

User moves a file from one location to another location within DBFS.

  • dst
  • source_path
  • src
  • destination_path

put

User uploads a file through the use of a multipart form post to DBFS.

  • path
  • overwrite

read

User reads the contents of a file.

  • path
  • offset
  • length

DBFS operational events

These audit events occur at the compute plane.

These events are logged under the service_name of dbfs.

action_name

Description

request_params

mount

User creates a mount point at a certain DBFS location.

  • mountPoint
  • owner

unmount

User removes a mount point at a certain DBFS location.

  • mountPoint

Files events

These events are logged at the workspace level. This service includes events related to file management, which includes interacting with files using the Files API or in the volumes UI.

These events are logged under the service_name of filesystem.

action_name

Description

request_params

directoriesDelete

A user deletes a directory using the Files API or the volumes UI.

  • path

directoriesGet

A user lists the contents of a directory using the Files API or the volumes UI.

  • path

directoriesHead

A user gets information about a directory using the Files API or the volumes UI.

  • path

directoriesPut

A user creates a directory using the Files API or the volumes UI.

  • path

filesDelete

User deletes a file using the Files API or the volumes UI.

  • path

filesGet

User downloads a file using the Files API or the volumes UI.

  • path
  • transferredSize

filesHead

User gets information about a file using the Files API or the volumes UI.

  • path

filesPut

User uploads a file using the Files API or the volumes UI.

  • path
  • receivedSize

Workspace files events

These events are logged at the workspace level. This service includes events related to workspaces files.

These events are logged under the service_name of workspaceFiles.

action_name

Description

request_params

wsfsStreamingRead

A workspace file is read by a user or programmatically as part of a workflow.

  • path

wsfsStreamingWrite

A workspace file is written to by a user or programmatically as part of a workflow.

  • path

wsfsImportFile

A user imports a file into the workspace.

  • path

Agent evaluation events

These events are logged at the workspace level. This service includes events related to agent evaluation, including production monitoring, evaluation datasets, human evaluation, and synthetic evaluation data generation.

Production monitoring events

These events are related to production monitoring, including scorers, metric backfill, and trace archival.

These events are logged under the service_name of agentEvaluation.

action_name

Description

request_params

getChatAssessments

A user requests LLM-judge assessments on an agent response.

  • experiment_id
  • requested_assessments

getChatCompletions

A user requests an LLM to evaluate an agent response. For example, by invoking a judge created by make_judge.

none

createScheduledScorers

A user creates scorers for an experiment.

  • experiment_id
  • scheduled_scorers.scorers.name
  • scheduled_scorers.scorers.sample_rate

getScheduledScorers

A user retrieves scorers for an experiment.

  • experiment_id

updateScheduledScorers

A user updates scorers for an experiment.

  • experiment_id
  • scheduled_scorers.scorers.name
  • scheduled_scorers.scorers.sample_rate

deleteScheduledScorers

A user deletes scorers for an experiment.

  • experiment_id

runMetricBackfill

A user runs a metric backfill for an experiment.

  • experiment_id
  • start_timestamp_ms
  • end_timestamp_ms

startTraceArchival

A user starts trace archival for an experiment.

  • experiment_id
  • archive_table_fullname

stopTraceArchival

A user stops trace archival for an experiment.

  • experiment_id

Evaluation dataset events

These events are related to evaluation datasets, including CRUD operations for datasets and dataset records, batch operations, and expectations management.

These events are logged under the service_name of agentEvaluation.

action_name

Description

request_params

createDataset

A user creates an evaluation dataset.

  • dataset.dataset_id
  • dataset.name

getDataset

A user retrieves an evaluation dataset.

  • dataset_id

listDatasets

A user lists evaluation datasets.

  • filter
  • order_by

updateDataset

A user updates an evaluation dataset.

  • dataset_id
  • dataset.dataset_id
  • dataset.name

deleteDataset

A user deletes an evaluation dataset.

  • dataset_id

createDatasetRecord

A user creates a record in an evaluation dataset.

  • dataset_id
  • dataset_record.dataset_record_id

getDatasetRecord

A user retrieves a record from an evaluation dataset.

  • dataset_id
  • dataset_record_id

listDatasetRecords

A user lists records in an evaluation dataset.

  • dataset_id

updateDatasetRecord

A user updates a record in an evaluation dataset.

  • dataset_id
  • dataset_record_id
  • dataset_record.dataset_record_id

deleteDatasetRecord

A user deletes a record from an evaluation dataset.

  • dataset_id
  • dataset_record_id

batchCreateDatasetRecords

A user creates multiple records in an evaluation dataset in a single batch operation.

  • dataset_id
  • requests.dataset_id
  • requests.dataset_record.dataset_record_id

upsertExpectations

A user upserts expectations for a record in an evaluation dataset.

  • dataset_id
  • dataset_record_id

Synthetic data generation events

These events are related to synthetic evaluation data generation.

These events are logged under the service_name of agentEvaluation.

action_name

Description

request_params

generateQuestions

A user generates synthetic questions for evaluation.

  • experiment_id
  • instance_id
  • num_questions

generateAnswer

A user generates synthetic answers for evaluation.

  • answer_types
  • experiment_id
  • instance_id

Review app events

These events are related to review apps for human evaluation, including review app management, labeling sessions, and item management.

These events are logged under the service_name of agentEvaluation.

action_name

Description

request_params

createReviewApp

A user creates a review app for human evaluation.

  • review_app.experiment_id
  • review_app.review_app_id

getReviewApp

A user retrieves a review app.

  • review_app_id

listReviewApps

A user lists review apps.

none

updateReviewApp

A user updates a review app.

  • review_app.experiment_id
  • review_app.review_app_id
  • review_app_id

createLabelingSession

A user creates a labeling session in a review app.

  • labeling_session.labeling_session_id
  • labeling_session.mlflow_run_id
  • labeling_session.name
  • review_app_id

getLabelingSession

A user retrieves a labeling session from a review app.

  • labeling_session_id
  • review_app_id

listLabelingSessions

A user lists labeling sessions in a review app.

  • review_app_id

updateLabelingSession

A user updates a labeling session in a review app.

  • labeling_session.labeling_session_id
  • labeling_session.mlflow_run_id
  • labeling_session.name
  • labeling_session_id
  • review_app_id

deleteLabelingSession

A user deletes a labeling session from a review app.

  • review_app_id
  • labeling_session_id

batchCreateItems

A user creates multiple items in a labeling session in a single batch operation.

  • items.item_id
  • labeling_session_id
  • review_app_id

getItem

A user retrieves an item from a labeling session.

  • review_app_id
  • labeling_session_id
  • item_id

listItems

A user lists items in a labeling session.

  • labeling_session_id
  • review_app_id

updateItem

A user updates an item in a labeling session.

  • review_app_id
  • labeling_session_id
  • item_id
  • item.item_id

batchDeleteItems

A user deletes multiple items from a labeling session in a single batch operation.

  • review_app_id
  • labeling_session_id
  • item_ids

Knowledge Assistant events

These events are logged at the workspace level. This service includes events related to managing Knowledge Assistants, their knowledge sources, and example questions, using the SDK or the Agent Bricks UI.

Knowledge Assistant management events

The following events are related to creating, retrieving, updating, listing, and deleting Knowledge Assistants, and to syncing their knowledge sources.

These events are logged under the service_name of knowledgeAssistant.

action_name

Description

request_params

create

A user creates a Knowledge Assistant.

  • knowledge_assistant.creator
  • knowledge_assistant.display_name
  • knowledge_assistant.endpoint_name
  • knowledge_assistant.error_info
  • knowledge_assistant.experiment_id
  • knowledge_assistant.id
  • knowledge_assistant.name
  • knowledge_assistant.state

get

A user retrieves a Knowledge Assistant.

  • name

update

A user updates a Knowledge Assistant.

  • knowledge_assistant.creator
  • knowledge_assistant.display_name
  • knowledge_assistant.endpoint_name
  • knowledge_assistant.error_info
  • knowledge_assistant.experiment_id
  • knowledge_assistant.id
  • knowledge_assistant.name
  • knowledge_assistant.state

delete

A user deletes a Knowledge Assistant.

  • name

list

A user lists Knowledge Assistants.

none

syncKnowledgeSources

A user starts a sync of the knowledge sources for a Knowledge Assistant.

  • name

Knowledge source events

The following events are related to knowledge sources attached to a Knowledge Assistant.

These events are logged under the service_name of knowledgeAssistant.

action_name

Description

request_params

createKnowledgeSource

A user creates a knowledge source for a Knowledge Assistant.

  • parent
  • knowledge_source.display_name
  • knowledge_source.file_table.table_name
  • knowledge_source.files.path
  • knowledge_source.index.index_name
  • knowledge_source.name

getKnowledgeSource

A user retrieves a knowledge source.

  • name

listKnowledgeSources

A user lists knowledge sources for a Knowledge Assistant.

  • parent

updateKnowledgeSource

A user updates a knowledge source.

  • name
  • knowledge_source.display_name
  • knowledge_source.file_table.table_name
  • knowledge_source.files.path
  • knowledge_source.index.index_name
  • knowledge_source.name

deleteKnowledgeSource

A user deletes a knowledge source.

  • name

Example events

The following events are related to example questions and guidelines used to tune a Knowledge Assistant.

These events are logged under the service_name of supervisorAgent.

action_name

Description

request_params

createExample

A user creates an example for a Knowledge Assistant.

  • parent
  • example.example_id
  • example.guidelines
  • example.name
  • example.question

getExample

A user retrieves an example.

  • name

listExamples

A user lists examples for a Knowledge Assistant.

  • parent

updateExample

A user updates an example.

  • name
  • example.example_id
  • example.guidelines
  • example.name
  • example.question

deleteExample

A user deletes an example.

  • name

importExamples

A user imports examples for a Knowledge Assistant from a Unity Catalog table.

  • name
  • table_name

exportExamples

A user exports examples for a Knowledge Assistant to a Unity Catalog table.

  • name
  • table_name

Supervisor Agent events

These events are logged at the workspace level. This service includes events related to managing Supervisor Agents, their tools, and example questions, using the SDK or the Agent Bricks UI.

Supervisor Agent management events

The following events are related to creating, retrieving, updating, listing, and deleting Supervisor Agents.

These events are logged under the service_name of supervisorAgent.

action_name

Description

request_params

create

A user creates a Supervisor Agent.

  • supervisor_agent.creator
  • supervisor_agent.endpoint_name
  • supervisor_agent.experiment_id
  • supervisor_agent.name
  • supervisor_agent.supervisor_agent_id

get

A user retrieves a Supervisor Agent.

  • name

update

A user updates a Supervisor Agent.

  • supervisor_agent.creator
  • supervisor_agent.endpoint_name
  • supervisor_agent.experiment_id
  • supervisor_agent.name
  • supervisor_agent.supervisor_agent_id

delete

A user deletes a Supervisor Agent.

  • name

list

A user lists Supervisor Agents.

none

Tool events

The following events are related to tools attached to a Supervisor Agent.

These events are logged under the service_name of supervisorAgent.

action_name

Description

request_params

createTool

A user adds a tool to a Supervisor Agent.

  • parent
  • tool_id
  • tool.name
  • tool.tool_id
  • tool.tool_type

getTool

A user retrieves a tool.

  • name

listTools

A user lists tools for a Supervisor Agent.

  • parent

updateTool

A user updates a tool.

  • tool.name
  • tool.tool_id
  • tool.tool_type

deleteTool

A user deletes a tool.

  • name

Example events

The following events are related to example questions and guidelines used to tune a Supervisor Agent.

These events are logged under the service_name of supervisorAgent.

action_name

Description

request_params

createExample

A user creates an example for a Supervisor Agent.

  • parent
  • example.example_id
  • example.guidelines
  • example.name
  • example.question

getExample

A user retrieves an example.

  • name

listExamples

A user lists examples for a Supervisor Agent.

  • parent

updateExample

A user updates an example.

  • name
  • example.example_id
  • example.guidelines
  • example.name
  • example.question

deleteExample

A user deletes an example.

  • name

MLflow experiment events

These events are logged at the workspace level. This service includes events related to MLflow experiments.

These events are logged under the service_name of mlflowExperiment.

action_name

Description

request_params

createMlflowExperiment

A user creates an MLflow experiment.

  • experimentId
  • path
  • experimentName

deleteMlflowExperiment

A user deletes an MLflow experiment.

  • experimentId
  • path
  • experimentName

moveMlflowExperiment

A user moves an MLflow experiment.

  • newPath
  • experimentId
  • oldPath

restoreMlflowExperiment

A user restores an MLflow experiment.

  • experimentId
  • path
  • experimentName

renameMlflowExperimentEvent

A user renames an MLflow experiment.

  • oldName
  • newName
  • experimentId
  • parentPath

MLflow artifacts with ACL events

These events are logged at the workspace level. This service includes events related to MLflow artifacts with ACLs.

These events are logged under the service_name of mlflowAcledArtifact.

action_name

Description

request_params

readArtifact

A user makes call to read an artifact.

  • artifactLocation
  • experimentId
  • runId

writeArtifact

A user makes call to write to an artifact.

  • artifactLocation
  • experimentId
  • runId

MLflow model registry events

These events are logged at the workspace level. This service includes events related to the workspace model registry. For activity logs for models in Unity Catalog, see Unity Catalog events.

These events are logged under the service_name of modelRegistry.

action_name

Description

request_params

approveTransitionRequest

A user approves a model version stage transition request.

  • name
  • version
  • stage
  • archive_existing_versions
  • comment

changeRegisteredModelAcl

A user updates permissions for a registered model.

  • registeredModelId
  • userId
  • aclPermissionSet
  • resourceId
  • shardName
  • targetUserId

createComment

A user posts a comment on a model version.

  • name
  • version

createModelVersion

A user creates a model version.

  • name
  • source
  • run_id
  • tags
  • run_link

createRegisteredModel

A user creates a new registered model

  • name
  • tags
  • description

createRegistryWebhook

User creates a webhook for Model Registry events.

  • orgId
  • registeredModelId
  • events
  • description
  • status
  • creatorId
  • httpUrlSpec

createTransitionRequest

A user creates a model version stage transition request.

  • name
  • version
  • stage
  • comment

deleteComment

A user deletes a comment on a model version.

  • id

deleteModelVersion

A user deletes a model version.

  • name
  • version

deleteModelVersionTag

A user deletes a model version tag.

  • name
  • version
  • key

deleteRegisteredModel

A user deletes a registered model

  • name

deleteRegisteredModelTag

A user deletes the tag for a registered model.

  • name
  • key

deleteRegistryWebhook

User deletes a Model Registry webhook.

  • orgId
  • webhookId

deleteTransitionRequest

A user cancels a model version stage transition request.

  • name
  • version
  • stage
  • creator

finishCreateModelVersionAsync

Completed asynchronous model copying.

  • name
  • version

generateBatchInferenceNotebook

Batch inference notebook is autogenerated.

  • userId
  • orgId
  • modelName
  • inputTableOpt
  • outputTablePathOpt
  • stageOrVersion
  • modelVersionEntityOpt
  • notebookPath

generateDltInferenceNotebook

Inference notebook for a declarative pipeline is autogenerated.

  • userId
  • orgId
  • modelName
  • inputTable
  • outputTable
  • stageOrVersion
  • notebookPath
  • input_table
  • name
  • output_table
  • stage
  • version

getModelVersionDownloadUri

A user gets a URI to download the model version.

  • name
  • version

getModelVersionSignedDownloadUri

A user gets a URI to download a signed model version.

  • name
  • version
  • path

listModelArtifacts

A user makes a call to list a model's artifacts.

  • name
  • version
  • path
  • page_token

listRegistryWebhooks

A user makes a call to list all registry webhooks in the model.

  • orgId
  • registeredModelId

rejectTransitionRequest

A user rejects a model version stage transition request.

  • name
  • version
  • stage
  • comment

renameRegisteredModel

A user renames a registered model

  • name
  • new_name

setEmailSubscriptionStatus

A user updates the email subscription status for a registered model

  • model_name
  • subscription_type

setModelVersionTag

A user sets a model version tag.

  • name
  • version
  • key
  • value

setRegisteredModelTag

A user sets a model version tag.

  • name
  • key
  • value

setUserLevelEmailSubscriptionStatus

A user updates their email notifications status for the whole registry.

  • orgId
  • userId
  • subscriptionStatus
  • subscription_type

testRegistryWebhook

A user tests the Model Registry webhook.

  • orgId
  • webhookId

transitionModelVersionStage

A user gets a list of all open stage transition requests for the model version.

  • name
  • version
  • stage
  • archive_existing_versions
  • comment

triggerRegistryWebhook

A Model Registry webhook is triggered by an event.

  • orgId
  • registeredModelId
  • events
  • status

updateComment

A user post an edit to a comment on a model version.

  • id

updateRegistryWebhook

A user updates a Model Registry webhook.

  • orgId
  • webhookId

Model serving events

These events are logged at the workspace level. This service includes events related to model serving.

These events are logged under the service_name of serverlessRealTimeInference.

action_name

Description

request_params

cancelUpdateServingEndpoint

User cancels an in-progress update of a model serving endpoint.

  • name

changeInferenceEndpointAcl

User updates permissions for an inference endpoint.

  • shardName
  • targetUserId
  • resourceId
  • aclPermissionSet

createServingEndpoint

User creates a model serving endpoint.

  • name
  • config

deleteServingEndpoint

User deletes a model serving endpoint.

  • name

getQuerySchemaPreview

Users makes a call to get the query schema preview.

  • endpoint_name

patchInferenceEndpointUsagePolicy

User updates the usage policy of a serving endpoint.

  • name

putInferenceEndpointAiGateway

User updates the AI Gateway configuration for a serving endpoint, including rate limits, guardrails, inference tables, fallbacks, and usage tracking

  • name
  • ai_gateway_config

startServingEndpoint

User starts a model serving endpoint.

  • name

stopServingEndpoint

User stops a model serving endpoint.

  • name

updateServingEndpoint

User updates a model serving endpoint.

  • name
  • served_models
  • traffic_config

Feature store events

These events are logged at the workspace level. This service includes events related to the Databricks Feature Store.

These events are logged under the service_name of featureStore.

action_name

Description

request_params

addConsumer

A consumer is added to the feature store.

  • features
  • job_run
  • notebook

addDataSources

A data source is added to a feature table.

  • feature_table
  • paths
  • tables

addProducer

A producer is added to a feature table.

  • feature_table
  • job_run
  • notebook
  • producer_action

changeFeatureTableAcl

Permissions are changed in a feature table.

  • aclPermissionSet
  • resourceId
  • shardName
  • targetUserId

createFeatureSpec

A feature specification is created.

  • feature_spec_yaml
  • name

createFeatureTable

A feature table is created.

  • description
  • is_imported
  • name
  • partition_keys
  • primary_keys
  • timestamp_keys

createFeatures

Features are created in a feature table.

  • feature_table
  • features

deleteFeatureTable

A feature table is deleted.

  • dry_run
  • name

deleteTags

Tags are deleted from a feature table.

  • feature_table_id
  • keys

generateFeatureSpecYaml

A feature specification YAML is generated.

  • exclude_columns
  • feature_spec_yaml
  • features
  • input_columns

getBrickstoreOnlineTableMetadata

A user gets Brickstore online table metadata.

  • feature_table_features

getConsumers

A user makes a call to get the consumers in a feature table.

  • feature_table

getFeatureStoreWidePermissions

A user gets feature store-wide permissions.

none

getFeatureTable

A user makes a call to get feature tables.

  • exclude_online_stores
  • include_producers
  • name

getFeatureTablesById

A user makes a call to get feature table IDs.

  • ids

getFeatures

A user makes a call to get features.

  • feature_table
  • max_results

getModelServingMetadata

A user makes a call to get Model Serving metadata.

  • feature_table_features

getOnlineFeatureTables

A user gets online feature tables.

  • create_if_not_exist
  • feature_table_features
  • include_brickstore
  • is_v1_serving

getOnlineStore

A user makes a call to get online store details.

  • cloud
  • feature_table
  • online_table
  • store_type

getOnlineStores

A user gets online stores.

  • feature_tables

getTags

A user makes a call to get tags for a feature table.

  • feature_table_id

logFeatureStoreClientEvent

A feature store client event is logged.

  • aggregate_features
  • create_materialized_view

publishFeatureTable

A feature table is published.

  • cloud
  • feature_table
  • host
  • online_table
  • port
  • read_secret_prefix
  • store_type
  • write_secret_prefix

searchFeatureTables

A user searches for feature tables.

  • catalog_names
  • exclude_online_stores
  • is_multi_catalog
  • max_results
  • owner_ids
  • page_token
  • search_scopes
  • sort_order
  • text

setTags

Tags are added to a feature table.

  • feature_table_id
  • tags

updateFeatureTable

A feature table is updated.

  • description
  • name

Unity Catalog HTTP connection events

These events are logged at the workspace level when requests are proxied through a Unity Catalog HTTP connection, such as when calling external functions or connecting to external MCP servers.

These events are logged under the service_name of ucHttpConnection.

action_name

Description

request_params

ucHttpConnectionProxiedRequest

A request is proxied through a Unity Catalog HTTP connection to an external endpoint.

  • auth_type
  • connection_id
  • connection_name
  • http_method

Vector search events

These events are logged at the workspace level. This service includes events related to Vector Search.

These events are logged under the service_name of vectorSearch.

action_name

Description

request_params

createEndpoint

User creates a vector search endpoint.

  • name
  • endpoint_type

deleteEndpoint

User deletes a vector search endpoint.

  • name

changeEndpointAcl

User updates permissions on a vector search endpoint.

  • access_control_list
  • request_object_id
  • request_object_type

createVectorIndex

User creates a vector search index.

  • name
  • endpoint_name
  • primary_key
  • index_type
  • delta_sync_index_spec
  • direct_access_index_spec

deleteVectorIndex

User deletes a vector search index.

  • name
  • endpoint_name (optional)
  • delete_embedding_writeback_table

changeEndpointAcl

User changes access control list for an endpoint.

  • name
  • endpoint_name
  • access_control_list

queryVectorIndex

User queries a vector search index.

  • name
  • endpoint_name (optional)

queryVectorIndexNextPage

User reads the paginated results of a vector search index query.

  • name
  • endpoint_name (optional)

scanVectorIndex

User scans all data in a vector search index.

  • name
  • endpoint_name (optional)

upsertDataVectorIndex

User upserts data in a Direct Access vector search index.

  • name
  • endpoint_name (optional)

deleteDataVectorIndex

User deletes data in a Direct Access vector search index.

  • name
  • endpoint_name (optional)

queryVectorIndexRouteOptimized

User queries a vector search index using a low-latency API route.

  • name
  • endpoint_name (optional)

queryVectorIndexNextPageRouteOptimized

User reads the paginated results of a vector search index query using a low-latency API route.

  • name
  • endpoint_name (optional)

scanVectorIndexRouteOptimized

User scans all data in a vector search index using a low-latency API route.

  • name
  • endpoint_name (optional)

upsertDataVectorIndexRouteOptimized

User upserts data in a Direct Access vector search index using a low-latency API route.

  • name
  • endpoint_name (optional)

deleteDataVectorIndexRouteOptimized

User deletes data in a Direct Access vector search index using a low-latency API route.

  • name
  • endpoint_name (optional)

Databricks SQL events

These events are logged at the workspace level. This service includes events related to Databricks SQL.

note

If you manage your SQL warehouses using the legacy SQL endpoints API, your SQL warehouse audit events will have different action names. See SQL endpoint logs.

These events are logged under the service_name of databrickssql.

action_name

Description

request_params

cancelQueryExecution

A query execution is cancelled from the SQL editor UI. This does not include cancellations that originate from the Query History UI or Databricks SQL Execution API.

  • queryExecutionId: Only emitted when the legacy SQL editor is used.
  • query_id: Only emitted when the new SQL editor is used.

changeEndpointAcls

A warehouse manager updates permissions on a SQL warehouse.

  • aclPermissionSet
  • resourceId
  • shardName
  • targetUserId

cloneFolderNode

A user clones a folder in the workspace browser.

  • dashboardId

commandFinish

Only in verbose audit logs. Generated when a command on a SQL warehouse completes or is canceled, regardless of the origin of the cancellation request.

  • warehouseId
  • commandId

commandSubmit

Only in verbose audit logs. Generated when a command is submitted to a SQL warehouse, regardless of origin of the request.

  • warehouseId
  • commandId
  • validation
  • commandText
  • commandParameters

createAlert

A user creates a legacy alert.

  • alertId
  • queryId

createQuery

A user creates a new query.

  • queryId

getQuery

A user opens a query in SQL editor page or calls the Databricks SQL Get a query API. Only emitted when the legacy SQL editor or Databricks SQL REST API is used.

  • queryId

createQueryDraft

A user creates a query draft. Only emitted when the legacy SQL editor is used.

  • queryId

createQuerySnippet

A user creates a query snippet.

  • querySnippetId

createVisualization

A user generates a visualization using the SQL editor. Excludes default results tables and visualizations in notebooks that utilize SQL warehouses. Only emitted when the legacy SQL editor is used.

  • queryId
  • visualizationId

createWarehouse

A user with the cluster create entitlement creates a SQL warehouse.

  • auto_resume
  • auto_stop_mins
  • channel
  • warehouse_type
  • cluster_size
  • conf_pairs
  • custom_cluster_confs
  • enable_databricks_compute
  • enable_photon
  • enable_serverless_compute
  • instance_profile_arn
  • max_num_clusters
  • min_num_clusters
  • name
  • size
  • spot_instance_policy
  • tags
  • test_overrides

deleteAlert

A user deletes a legacy alert through the API. Excludes deletions from the file browser UI or from the legacy alert interface.

  • alertId

deleteNotificationDestination

A workspace admin deletes a notification destination.

  • notificationDestinationId

deleteWarehouse

A warehouse manager deletes a SQL warehouse.

  • id

deleteQuery

A user deletes a query, either from the query interface or through API. Excludes deletion via the file browser UI.

  • queryId

deleteQueryDraft

A user deletes a query draft. Only emitted when the legacy SQL editor is used.

  • queryId

deleteQuerySnippet

A user deletes a query snippet.

  • querySnippetId

deleteVisualization

A user deletes a visualization from a query in the SQL Editor. Only emitted when the legacy SQL editor is used.

  • visualizationId

downloadQueryResult

A user downloads a query result from the SQL Editor. Excludes downloads from dashboards.

  • fileType
  • queryId
  • queryResultId: Only emitted when the legacy SQL editor is used.
  • credentialsEmbedded
  • credentialsEmbeddedId

editWarehouse

A warehouse manager makes edits to a SQL warehouse.

  • auto_stop_mins
  • channel
  • warehouse_type
  • cluster_size
  • confs
  • enable_photon
  • enable_serverless_compute
  • id
  • instance_profile_arn
  • max_num_clusters
  • min_num_clusters
  • name
  • spot_instance_policy
  • tags

executeAdhocQuery

Generated by one of the following:

- A user runs a query draft in the SQL editor
- A query is executed from a visualization aggregation
- A user loads a dashboard and executes underlying queries

  • dataSourceId: Only emitted when the legacy SQL editor is used. Equivalent to the SQL warehouse ID.
  • warehouse_id: Only emitted when the new SQL editor is used.
  • query_id: Only emitted when the new SQL editor is used. Corresponds to the current query text in the new SQL editor, which may be equivalent to the original saved query.

executeSavedQuery

A user runs a saved query. Only emitted when the legacy SQL editor is used.

  • queryId

favoriteQuery

A user favorites a query.

  • queryId

forkQuery

A user clones a query.

  • originalQueryId
  • queryId

getAlert

A user opens a legacy alert's details page or calls the legacy get alert API.

  • id: ID of the alert

getHistoryQueriesByLookupKeys

A user gets details for one or more query executions using lookup keys.

  • lookup_keys
  • include_metrics

getHistoryQuery

A user gets details for a query execution using the UI.

  • id
  • queryId
  • include_metrics
  • include_plans
  • include_json_plans

listHistoryQueries

A user opens the query history page or calls the Query History List Queries API.

  • filter_by
  • include_metrics
  • max_results
  • page_token
  • order_by

moveAlertToTrash

A user moves an legacy alert to the trash using the API. Excludes deletions from the file browser UI or from the legacy alert interface.

  • alertId

moveQueryToTrash

A user moves a query to the trash.

  • queryId
  • treestoreId: Only emitted when the new SQL editor is used and a valid queryId cannot be returned.

restoreAlert

A user restores a legacy alert from the trash.

  • alertId

restoreQuery

A user restores a query from the trash.

  • queryId

setWarehouseConfig

A workspace admin updates their workspace's SQL warehouse settings, including configuration parameters and data access properties.

  • data_access_config
  • enable_serverless_compute
  • instance_profile_arn
  • security_policy
  • serverless_agreement
  • sql_configuration_parameters

startWarehouse

A SQL warehouse is started.

  • id

stopWarehouse

A warehouse manager stops a SQL warehouse. Excludes autostopped warehouses.

  • id

transferObjectOwnership

A workspace admin transfers the ownership of a dashboard, query, or legacy alert to an active user through the transfer object ownership API. Ownership transfer done through the UI or update APIs is not captured by this audit log event.

  • newOwner
  • objectId
  • objectType

unfavoriteQuery

A user removes a query from their favorites.

  • queryId

updateAlert

A user makes updates to a legacy alert. ownerUserName is populated if the legacy alert ownership is transferred using the API.

  • alertId
  • queryId
  • ownerUserName

updateNotificationDestination

A workspace admin makes an update to a notification destination.

  • notificationDestinationId

updateFolderNode

A user updates a folder node in the workspace browser.

  • name

updateOrganizationSetting

A workspace admin makes updates to the workspace's SQL settings.

  • has_configured_data_access
  • has_explored_sql_warehouses
  • has_granted_permissions
  • hide_plotly_mode_bar
  • send_email_on_failed_dashboards
  • allow_downloads

updateQuery

A user makes an update to a query. ownerUserName is populated if the query ownership is transferred using the API.

  • queryId
  • ownerUserName

updateQueryDraft

A user makes an update to a query draft. Only emitted when the legacy SQL editor is used.

  • queryId

updateQuerySnippet

A user makes an update to a query snippet.

  • querySnippetId

updateVisualization

A user updates a visualization from the SQL Editor. Only emitted when the legacy SQL editor is used.

  • visualizationId

Notebook events

These events are logged at the workspace level. This service includes events related to notebooks.

These events are logged under the service_name of notebook.

action_name

Description

request_params

attachNotebook

A notebook is attached to a cluster. Also emitted when the new SQL editor is attached to a SQL warehouse.

  • path
  • clusterId
  • notebookId

cloneNotebook

A user clones a notebook.

  • notebookId
  • path
  • clonedNotebookId
  • destinationPath

createFolder

A notebook folder is created.

  • path

createNotebook

A notebook is created.

  • notebookId
  • path

deleteFolder

A notebook folder is deleted.

  • path

deleteNotebook

A notebook is deleted.

  • notebookId
  • notebookName
  • path

deleteRepo

A repository is deleted.

  • path

detachNotebook

A notebook is detached from a cluster. Also emitted when the new SQL editor is detached from a SQL warehouse.

  • notebookId
  • clusterId
  • path

downloadLargeResults

A user downloads query results too large to display in the notebook. Also emitted when the new SQL editor is used to download query results.

  • notebookId
  • notebookFullPath
  • commandId
  • fileType

downloadPreviewResults

A user downloads query results from a notebook or the new SQL editor. Also emitted when a user views a previous result in execution history. If the log is from a view, fileType is set to json.

  • notebookId
  • notebookFullPath
  • commandId
  • fileType
  • statementId: Only emitted when a user views a previous result in execution history.

importNotebook

A user imports a notebook.

  • path
  • workspaceExportFormat

modifyNotebook

A notebook is modified.

  • notebookId
  • path

moveFolder

A notebook folder is moved from one location to another.

  • oldPath
  • newPath
  • folderId

moveNotebook

A notebook is moved from one location to another.

  • newPath
  • oldPath
  • notebookId

openNotebook

A user opens a notebook using the UI.

  • notebookId
  • path

renameFolder

A notebook folder is renamed.

  • folderId
  • newName
  • oldName
  • parentPath

renameNotebook

A notebook is renamed.

  • newName
  • oldName
  • parentPath
  • notebookId

restoreFolder

A deleted folder is restored.

  • path

restoreNotebook

A deleted notebook is restored.

  • path
  • notebookId
  • notebookName

restoreRepo

A deleted repository is restored.

  • path

runCommand

Available when verbose audit logs are enabled. Emitted after Databricks runs a command in a notebook or the new SQL editor. A command corresponds to a cell in a notebook or the query text in the new SQL editor.

executionTime is measured in seconds.

  • notebookId
  • executionTime
  • status
  • commandId
  • commandText
  • commandLanguage

submitCommand

Generated when a command is submitted for execution in a notebook or the new SQL editor. A command corresponds to a cell in a notebook or the query text in the new SQL editor.

  • notebookId
  • commandId
  • clusterId
  • commandLanguage
  • commandText (only available when verbose audit logs are enabled)

takeNotebookSnapshot

Notebook snapshots are taken when either the job service or mlflow is run.

  • path

Git folder events

These events are logged at the workspace level. This service includes events related to Databricks Git folders. See also gitCredentials.

These events are logged under the service_name of repos.

action_name

Description

request_params

checkoutBranch

A user checks out a branch on the repo.

  • id
  • branch

commitAndPush

A user commits and pushes to a repo.

  • id
  • message
  • files
  • checkSensitiveToken

createRepo

A user creates a repo in the workspace

  • url
  • provider
  • path

deleteRepo

A user deletes a repo.

  • id

discard

A user discards a commit to a repo.

  • id
  • file_paths

getRepo

A user makes a call to get information about a single repo.

  • id

listRepos

A user makes a call to get all repos they have Manage permissions on.

  • path_prefix
  • next_page_token

pull

A user pulls the latest commits from a repo.

  • id

updateRepo

A user updates the repo to a different branch or tag, or to the latest commit on the same branch.

  • id
  • branch
  • tag
  • git_url
  • git_provider

Git credential events

These events are logged at the workspace level. This service includes events related to Git credentials for Databricks Git folders.

These events are logged under the service_name of gitCredentials.

action_name

Description

request_params

createGitCredential

A user creates a git credential.

  • git_provider
  • git_username

deleteGitCredential

A user deletes a git credential.

  • id

getGitCredential

A user gets a git credentials.

  • id

linkGitProvider

A user links a git provider.

  • git_provider
  • principal_id

listGitCredentials

A user lists all git credentials

  • principal_id

updateGitCredential

A user updates a git credential.

  • id
  • git_provider
  • git_username

Global init scripts events

These events are logged at the workspace level. This service includes events related global init scripts.

These events are logged under the service_name of globalInitScripts.

action_name

Description

request_params

batch-reorder

A workspace admin reorders global initialization scripts.

  • script_ids

create

A workspace admin creates a global initialization script.

  • name
  • position
  • script-SHA256
  • enabled

update

A workspace admin updates a global initialization script.

  • script_id
  • name
  • position
  • script-SHA256
  • enabled

delete

A workspace admin deletes a global initialization script.

  • script_id

Remote history service events

These events are logged at the workspace level. This service includes events related to adding and removing GitHub Credentials.

These events are logged under the service_name of RemoteHistoryService.

action_name

Description

request_params

addUserGitHubCredentials

User adds Github Credentials

none

deleteUserGitHubCredentials

User removes Github Credentials

none

updateUserGitHubCredentials

User updates Github Credentials

none

Workspace events

These events are logged at the workspace level. This service includes events related to workspace management.

These events are logged under the service_name of workspace.

action_name

Description

request_params

addPermissionAssignment

An account admin adds a principal to a workspace.

  • principal_id
  • account_id
  • workspace_id

changeWorkspaceAcl

Permissions to the workspace are changed.

  • shardName
  • targetUserId
  • aclPermissionSet
  • resourceId

deletePermissionAssignment

A workspace admin removes a principal from a workspace.

  • principal_id
  • account_id
  • workspace_id

deleteSetting

A setting is deleted from the workspace.

  • settingKeyTypeName
  • settingKeyName
  • settingTypeName
  • settingName

fileCreate

User creates a file in the workspace.

  • path

fileDelete

User deletes a file in the workspace.

  • path

fileEditorOpenEvent

User opens the file editor.

  • notebookId
  • path

getPermissionAssignment

An account admin gets a workspace's permission assignments.

  • account_id
  • workspace_id

getRoleAssignment

User gets a workspace's user roles.

  • account_id
  • workspace_id

mintOAuthAuthorizationCode

Recorded when in-house OAuth authorization code is minted at the workspace level.

  • client_id

mintOAuthToken

OAuth token is minted for workspace.

  • grant_type
  • scope
  • expires_in
  • client_id

moveWorkspaceNode

A workspace admin moves workspace node.

  • destinationPath
  • path

purgeWorkspaceNodes

A workspace admin purges workspace nodes.

  • treestoreId

reattachHomeFolder

An existing home folder is re-attached for a user that is re-added to the workspace.

  • path

renameWorkspaceNode

A workspace admin renames workspace nodes.

  • path
  • destinationPath

unmarkHomeFolder

Home folder special attributes are removed when a user is removed from the workspace.

  • path

updateRoleAssignment

A workspace admin updates a workspace user's role.

  • account_id
  • workspace_id
  • principal_id
  • role

updatePermissionAssignment

A workspace admin adds a principal to the workspace.

  • principal_id
  • permissions

setSetting

A workspace admin configures a workspace setting.

  • settingKeyTypeName
  • settingKeyName
  • settingTypeName
  • settingName
  • settingValueForAudit

workspaceConfEdit

Workspace admin makes updates to a setting, for example enabling verbose audit logs.

  • workspaceConfKeys
  • workspaceConfValues

workspaceExport

User exports a notebook from a workspace.

  • workspaceExportDirectDownload
  • workspaceExportFormat
  • notebookFullPath

workspaceInHouseOAuthClientAuthentication

OAuth client is authenticated in workspace service.

  • user

Secrets events

These events are logged at the workspace level. This service includes events related to secrets.

These events are logged under the service_name of secrets.

action_name

Description

request_params

createScope

User creates a secret scope.

  • scope
  • initial_manage_principal
  • scope_backend_type

deleteAcl

User deletes ACLs for a secret scope.

  • scope
  • principal

deleteScope

User deletes a secret scope.

  • scope

deleteSecret

User deletes a secret from a scope.

  • key
  • scope

getAcl

User gets ACLs for a secret scope.

  • scope
  • principal

getSecret

User gets a secret from a scope.

  • key
  • scope

listAcls

User makes a call to list ACLs for a secret scope.

  • scope

listScopes

User makes a call to list secret scopes

none

listSecrets

User makes a call to list secrets within a scope.

  • scope

putAcl

User changes ACLs for a secret scope.

  • scope
  • principal
  • permission

putSecret

User adds or edits a secret within a scope.

  • string_value
  • key
  • scope

SSH events

These events are logged at the workspace level. This service includes events related to SSH access.

These events are logged under the service_name of ssh.

action_name

Description

request_params

login

Agent login of SSH into Spark driver.

  • containerId
  • userName
  • port
  • publicKey
  • instanceId

logout

Agent logout of SSH from Spark driver.

  • userName
  • containerId
  • instanceId

Web terminal events

These events are logged at the workspace level. This service includes events related to the web terminal feature.

These events are logged under the service_name of webTerminal.

action_name

Description

request_params

startSession

User starts a web terminal sessions.

  • socketGUID
  • clusterId
  • serverPort
  • ProxyTargetURI

closeSession

User closes a web terminal session.

  • socketGUID
  • clusterId
  • serverPort
  • ProxyTargetURI

Databricks Apps events

These events are logged at the workspace level. This service includes events related to Databricks Apps.

These events are logged under the service_name of apps.

action_name

Description

request_params

createApp

A user creates a custom app using the Apps UI or API.

  • app

installTemplateApp

A user installs a template app using the Apps UI or API.

  • app

updateApp

A user updates an app using the Apps UI or API.

  • app

startApp

A user starts the app compute using the Apps UI or API.

  • name

stopApp

A user stops the app compute using the Apps UI or API.

  • name

deployApp

A user deploys an app using the Apps UI or API.

  • app_deployment

deleteApp

A user deletes an app using the Apps UI or API.

  • name

changeAppsAcl

A user updates an app's access using the Apps UI or API.

  • request_object_type
  • request_object_id
  • access_control_list

Marketplace consumer events

These events are logged at the workspace level. This service includes events related to consumer actions in Databricks Marketplace.

These events are logged under the service_name of marketplaceConsumer.

action_name

Description

request_params

getDataProduct

A user gets access to a data product through the Databricks Marketplace.

  • listing_id
  • listing_name
  • share_name
  • catalog_name
  • request_context: Array of information about the account and metastore that got access to the data product

requestDataProduct

A user requests access to a data product that requires provider approval.

  • listing_id
  • listing_name
  • catalog_name
  • request_context: Array of information about the account and metastore requesting access to the data product

Marketplace provider events

These events are logged at the workspace level. This service includes events related to provider actions in Databricks Marketplace.

These events are logged under the service_name of marketplaceProvider.

action_name

Description

request_params

createListing

A metastore admin creates a listing in their provider profile.

  • listing: Array of details about the listing
  • request_context: Array of information about the provider's account and metastore

updateListing

A metastore admin makes an update to a listing in their provider profile.

  • id
  • listing: Array of details about the listing
  • request_context: Array of information about the provider's account and metastore

deleteListing

A metastore admin deletes a listing in their provider profile.

  • id
  • request_context: Array of details about the provider's account and metastore

updateConsumerRequestStatus

A metastore admins approves or denies a data product request.

  • listing_id
  • request_id
  • status
  • reason
  • share: Array of information about the share
  • request_context: Array of information about the provider's account and metastore

createProviderProfile

A metastore admin creates a provider profile.

  • provider: Array of information about the provider
  • request_context: Array of information about the provider's account and metastore

updateProviderProfile

A metastore admin makes an update to their provider profile.

  • id
  • provider: Array of information about the provider
  • request_context: Array of information about the provider's account and metastore

deleteProviderProfile

A metastore admin deletes their provider profile.

  • id
  • request_context: Array of information about the provider's account and metastore

uploadFile

A provider uploads a file to their provider profile.

  • request_context: Array of information about the provider's account and metastore
  • marketplace_file_type
  • display_name
  • mime_type
  • file_parent: Array of file parent details

deleteFile

A provider deletes a file from their provider profile.

  • file_id
  • request_context: Array of information about the provider's account and metastore

Webhook events

These events are logged at the workspace level. This service includes events related to notification destinations.

These events are logged under the service_name of webhookNotifications.

action_name

Description

request_params

createWebhook

An admin creates a new notification destination.

  • name
  • options
  • type

deleteWebhook

An admin deletes a notification destination.

  • id

getWebhook

A user views information about a notification destination using the UI or API.

  • id

notifyWebhook

A webhook is triggered and sends a notification payload to the target URL.

  • body
  • id

testWebhook

A test payload is sent to a webhook URL to verify the configuration and ensure it can receive notifications successfully.

  • id

updateWebhook

An admin updates a notification destination.

  • name
  • options
  • type

Partner Connect events

These events are logged at the workspace level. This service includes events related to Partner Connect.

These events are logged under the service_name of partnerHub.

action_name

Description

request_params

createOrReusePartnerConnection

A workspace admin sets up a connection to a partner solution.

  • partner_name

deletePartnerConnection

A workspace admin deletes a partner connection.

  • partner_name

downloadPartnerConnectionFile

A workspace admin downloads the partner connection file.

  • partner_name

setupResourcesForPartnerConnection

A workspace admin sets up resources for a partner connection.

  • partner_name

Genie events

These events are logged at the workspace level. This service includes events related to remote workspace access by support personnel.

note

This service is unrelated to Genie Spaces. See Genie Space events.

These events are logged under the service_name of genie.

action_name

Description

request_params

databricksAccess

A Databricks personnel is authorized to access a customer environment.

  • duration
  • approver
  • reason
  • authType
  • user

Account-level services

The following services log audit events at the account level.

Account access control events

These events are logged at the account level and are related to the Account Access Control API (Public Preview).

These events are logged under the service_name of accountsAccessControl.

action_name

Description

request_params

updateRuleSet

A user updates a rule set using the Account Access Control API.

  • account_id
  • name: Name of the rule set
  • rule_set
  • authz_identity

Federation policy events

These events are logged at the account level and are related to federation policies.

These events are logged under the service_name of accounts.

action_name

Description

request_params

createFederationPolicy

An account admin creates an account or service principal federation policy.

  • policy_id
  • service_principal_id (optional)

deleteFederationPolicy

An account admin deletes an account or service principal federation policy.

  • policy_id
  • service_principal_id (optional)

updateFederationPolicy

An account admin updates an account or service principal federation policy.

  • policy_id
  • service_principal_id (optional)

Account-level authentication events

These events are related to account console authentication.

These events are logged under the service_name of accounts.

action_name

Description

request_params

accountInHouseOAuthClientAuthentication

An OAuth client is authenticated.

  • endpoint
  • user: logged as an email address
  • authenticationMethod

accountLoginCodeAuthentication

A user's account login code is authenticated.

  • user

accountlessToAccountLoginAuthentication

A user logs in through the accountless-to-account upgrade flow.

  • user
  • authenticationMethod

deletePasskeyCredential

A user deletes a passkey credential.

  • credential_id

deleteTotpCredential

A user deletes a TOTP authenticator app setup key.

login

A user logs into the account console.

  • user
  • authenticationMethod

logout

A user logs out of the account console.

  • user

mfaLogin

A user logs in to the account console using multi-factor authentication.

  • user
  • authenticationMethod

mintOAuthAuthorizationCode

Recorded when in-house OAuth authorization code is minted at the account level.

  • client_id

mintOAuthToken

An account-level OAuth token is issued to the service principal.

  • grant_type
  • scope
  • expires_in
  • client_id

multiFactorAuthenticationLogin

A user logs in to the account console using multi-factor authentication.

  • user
  • authenticationMethod

multiFactorAuthenticationUpdateUserAuthPolicy

A user's multi-factor authentication policy is updated.

  • user_mfa_state
  • user_id

oidcBrowserLogin

A user logs into their account with the OpenID Connect browser workflow.

  • user

oidcTokenAuthorization

An OIDC token is authenticated for an account admin login.

  • user
  • authenticationMethod

registerPasskeyCredential

A user registers a passkey credential for multi-factor authentication.

registerTotpCredential

A user registers a TOTP authenticator app credential for multi-factor authentication.

skipRegistration

A user skips multi-factor authentication registration.

tokenLogin

A user logs into Databricks using a token.

  • tokenId
  • user
  • authenticationMethod

Account-level user and group management events

These events are related to account-level user and group management.

These events are logged under the service_name of accounts.

action_name

Description

request_params

activateUser

A user is reactivated after being deactivated. See Deactivate users in account.

  • targetUserName
  • endpoint
  • targetUserId

add

A user is added to the Databricks account.

  • targetUserName
  • endpoint
  • targetUserId

addPrincipalToGroup

A user is added to an account-level group.

  • targetGroupId
  • endpoint
  • targetUserId
  • targetGroupName
  • groupMembershipType
  • targetUserName

addPrincipalsToGroup

Users are added to an account-level group using SCIM provisioning.

  • targetGroupId
  • endpoint
  • targetUserId
  • targetGroupName
  • targetUserName

createGroup

An account-level group is created.

  • endpoint
  • targetGroupId
  • targetGroupName

deactivateUser

A user is deactivated. See Deactivate users in account.

  • targetUserName
  • endpoint
  • targetUserId

delete

A user is deleted from the Databricks account.

  • targetUserId
  • targetUserName
  • endpoint

removeAccountAdmin

An account admin removes account admin permissions from another user.

  • targetUserName
  • endpoint
  • targetUserId

removeGroup

A group is removed from the account.

  • targetGroupId
  • targetGroupName
  • endpoint

removePrincipalFromGroup

A user is removed from an account-level group.

  • targetGroupId
  • endpoint
  • targetUserId
  • targetGroupName
  • groupMembershipType
  • targetUserName

removePrincipalsFromGroup

Users are removed from an account-level group using SCIM provisioning.

  • targetGroupId
  • endpoint
  • targetUserId
  • targetGroupName
  • targetUserName

setAccountAdmin

An account admin assigns the account admin role to another user.

  • targetUserName
  • endpoint
  • targetUserId

updateGroup

An account admin updates an account-level group.

  • endpoint
  • targetGroupId
  • targetGroupName

updateUser

An account admin updates a user account.

  • targetUserName
  • endpoint
  • targetUserId

usernameDomainDenied

A user sign-up attempt is denied because the email domain is not allowed.

  • targetUserName

validateEmail

When a user validates their email after account creation.

  • endpoint
  • targetUserName
  • targetUserId

Account-level token and settings events

These events are related to token management and account settings.

These events are logged under the service_name of accounts.

action_name

Description

request_params

accountIpAclsValidationFailed

IP permissions validation fails. Returns statusCode 403.

  • sourceIpAddress
  • user: logged as an email address

deleteSetting

Account admin removes a setting from the Databricks account.

  • settingKeyTypeName
  • settingKeyName
  • settingTypeName
  • settingName
  • settingValueForAudit

garbageCollectDbToken

A user runs a garbage collect command on expired tokens.

  • tokenExpirationTime
  • tokenClientId
  • userId
  • tokenCreationTime
  • tokenFirstAccessed
  • tokenHash

generateDbToken

User generates a token from User Settings or when the service generates the token.

  • tokenExpirationTime
  • tokenCreatedBy
  • tokenHash
  • userId

setSetting

An account admin updates an account-level setting.

  • settingKeyTypeName
  • settingKeyName
  • settingTypeName
  • settingName
  • settingValueForAudit

Service principal credentials events

These events are logged at the account level. These events are related to service credentials.

These events are logged under the service_name of servicePrincipalCredentials.

action_name

Description

request_params

create

Account admin generates an OAuth secret for the service principal.

  • account_id
  • service_principal
  • secret_id
  • lifetime

list

Account admin lists all OAuth secrets under a service principal.

  • account_id
  • service_principal

delete

Account admin deletes a service principal's OAuth secret.

  • account_id
  • service_principal
  • secret_id

Oauth SSO events

These events are logged at the account level and are related to OAuth SSO authentication to the account console.

These events are logged under the service_name of oauth2.

action_name

Description

request_params

createCustomAppIntegration

A workspace admin creates custom app integration.

  • redirect_url
  • name
  • token_access_policy
  • confidential

createPublishedAppIntegration

A workspace admin creates an app integration using a published app integration.

  • app_id

deleteCustomAppIntegration

A workspace admin deletes custom app integration.

  • integration_id

deletePublishedAppIntegration

A workspace admin deletes published app integration.

  • integration_id

enrollOAuth

A workspace admin enrolls account in OAuth.

  • enable_all_published_apps

updateCustomAppIntegration

A workspace admin updates custom app integration.

  • redirect_url
  • name
  • token_access_policy
  • confidential

updatePublishedAppIntegration

A workspace admin updates published app integration.

  • token_access_policy

Single-sign on events

These events are logged at the account level and are related to SSO authentication for the account console.

These events are logged under the service_name of ssoConfigBackend.

action_name

Description

request_params

create

Account admin created an account console SSO configuration.

  • account_id
  • sso_type
  • config

get

Account admin requested details about an account console SSO configuration.

  • account_id
  • sso_type

update

Account admin updated an account console SSO configuration.

  • account_id
  • sso_type
  • config
  • status

Account provisioning events

These events are logged at the account level. These events have to do with cloud configurations made by account admins in the account console.

Workspace provisioning events

These events are related to workspace configuration.

These events are logged under the service_name of accountsManager.

action_name

Description

request_params

acceptTos

Admin accepts a workspace's terms of service.

  • workspace_id

createWorkspaceConfiguration

Account admin creates a new workspace. The workspace request parameter is an array of deployment information including workspace_name. You can find the workspace_id in the response.result parameter.

  • workspace

deleteWorkspaceConfiguration

Account admin deleted a workspace.

  • account_id
  • workspace_id

getWorkspaceConfiguration

Account admin requests details about a workspace.

  • account_id
  • workspace_id

listWorkspaceConfigurations

Account admin lists all workspaces in the account.

  • account_id

sendTos

An email was sent to a workspace admin to accept the Databricks Terms of Service.

  • account_id
  • workspace_id

updateWorkspaceConfiguration

Admin updated the configuration for a workspace.

  • account_id
  • workspace_id
  • network_connectivity_config_id

Infrastructure configuration events

These events are related to cloud infrastructure configuration, including credentials, storage, encryption keys, VPC endpoints, and private access settings.

These events are logged under the service_name of accountsManager.

action_name

Description

request_params

createCredentialsConfiguration

Account admin created a credentials configuration.

  • credentials

createCustomerManagedKeyConfiguration

Account admin created a customer-managed key configuration.

  • customer_managed_key

createPrivateAccessSettings

Account admin created a private access settings configuration.

  • private_access_settings

createStorageConfiguration

Account admin created a storage configuration.

  • storage_configuration

createVpcEndpoint

Account admin created a VPC endpoint configuration.

  • vpc_endpoint

deleteCredentialsConfiguration

Account admin deleted a credentials configuration.

  • account_id
  • credentials_id

deleteCustomerManagedKeyConfiguration

Account admin deleted a customer-managed key configuration.

  • account_id
  • customer_managed_key_id

deletePrivateAccessSettings

Account admin deleted a private access settings configuration.

  • account_id
  • private_access_settings_id

deleteStorageConfiguration

Account admin deleted a storage configuration.

  • account_id
  • storage_configuration_id

deleteVpcEndpoint

Account admin deleted a VPC endpoint configuration.

  • account_id
  • vpc_endpoint_id

getCredentialsConfiguration

Account admin requests details about a credentials configuration.

  • account_id
  • credentials_id

getCustomerManagedKeyConfiguration

Account admin requests details about a customer-managed key configuration.

  • account_id
  • customer_managed_key_id

getPrivateAccessSettings

Account admin requests details about a private access settings configuration.

  • account_id
  • private_access_settings_id

getStorageConfiguration

Account admin requests details about a storage configuration.

  • account_id
  • storage_configuration_id

getVpcEndpoint

Account admin requests details about a VPC endpoint configuration.

  • account_id
  • vpc_endpoint_id

listCredentialsConfigurations

Account admin lists all credentials configurations in the account.

  • account_id

listCustomerManagedKeyConfigurations

Account admin lists all customer-managed key configurations in the account.

  • account_id

listPrivateAccessSettings

Account admin lists all private access settings configurations in the account.

  • account_id

listStorageConfigurations

Account admin lists all storage configurations in the account.

  • account_id

listVpcEndpoints

Account admin listed all VPC endpoint configurations for the account.

  • account_id

listWorkspaceEncryptionKeyRecords

Account admin lists all encryption key records in a specific workspace.

  • account_id
  • workspace_id

listWorkspaceEncryptionKeyRecordsForAccount

Account admin lists all encryption key records in the account.

  • account_id

Network configuration events

These events are related to network configuration, including network connectivity and network policies.

These events are logged under the service_name of accountsManager.

action_name

Description

request_params

createNetworkConfiguration

Account admin created a network configuration.

  • network

createNetworkConnectivityConfig

Account admin created a network connectivity configuration.

  • network_connectivity_config
  • account_id

deleteNetworkConfiguration

Account admin deleted a network configuration.

  • account_id
  • network_id

getNetworkConfiguration

Account admin requests details about a network configuration.

  • account_id
  • network_id

listNetworkConfigurations

Account admin lists all network configurations in the account.

  • account_id

createNetworkPolicy

Account admin created a network policy.

  • account_id
  • network_policy

getNetworkPolicy

Account admin requests details about a network policy.

  • account_id
  • network_policy_id

listNetworkPolicies

Account admin lists all network policies in the account.

  • account_id

updateNetworkPolicy

Account admin updated a network policy.

  • account_id
  • network_policy_id

deleteNetworkPolicy

Account admin deleted a network policy.

  • account_id
  • network_policy_id

getWorkspaceNetworkOption

Account admin requests details about a workspace's network policies.

  • account_id
  • workspace_id

updateWorkspaceNetworkOption

Account admin updated a workspace's network policy.

  • account_id
  • workspace_id

Account administration events

These events are related to account administration.

These events are logged under the service_name of accountsManager.

action_name

Description

request_params

accountUserResetPassword

Account admin resets a users password. Also logs whether the user changed the password after the reset.

  • wasPasswordChanged
  • serviceSource
  • targetUserId
  • userId
  • newPasswordSource

changeAccountOwner

Account owner role is transferred to another account admin.

  • account_id
  • first_name
  • last_name
  • email

consolidateAccounts

The account was consolidated with another account by Databricks.

  • target_account_id
  • account_ids_to_consolidate

listSubscriptions

Account admin lists all account billing subscriptions.

  • account_id

updateAccount

The account details were changed internally.

  • account_id
  • account

updateSubscription

The account billing subscriptions were updated.

  • account_id
  • subscription_id
  • subscription

Billable usage events

These events are logged at the account level. This service includes events related to billable usage access in the account console.

These events are logged under the service_name of accountBillableUsage.

action_name

Description

request_params

getAggregatedUsage

User accessed aggregated billable usage (usage per day) for the account via the Usage Graph feature.

  • account_id
  • window_size
  • start_time
  • end_time
  • meter_name
  • workspace_ids_filter

getDetailedUsage

User accessed detailed billable usage (usage for each cluster) for the account via the Usage Download feature.

  • account_id
  • start_month
  • end_month
  • with_pii

Serverless budget policy events

These events are logged at the account level and are related to serverless budget policies. See Attribute usage with serverless usage policies.

These events are logged under the service_name of budgetPolicyCentral.

action_name

Description

request_params

createBudgetPolicy

Workspace admin or billing admin creates a serverless budget policy. The new policy_id is logged in the response column.

  • policy_name

updateBudgetPolicy

Workspace admin, billing admin, or policy manager updates a serverless budget policy.

  • policy.policy_id
  • policy.policy_name

deleteBudgetPolicy

Workspace admin, billing admin, or policy manager deletes a serverless budget policy.

  • policy_id

Log delivery events

These events are logged at the account level. These events are related to audit and billing log delivery.

These events are logged under the service_name of logDelivery.

action_name

Description

request_params

createLogDeliveryConfiguration

Admin created a log delivery configuration.

  • account_id
  • config_id

getLogDeliveryConfiguration

Admin requested details about a log delivery configuration.

  • log_delivery_configuration

listLogDeliveryConfigurations

Admin listed all log delivery configurations in the account.

  • account_id
  • storage_configuration_id
  • credentials_id
  • status

updateLogDeliveryConfiguration

Admin updated a log delivery configuration.

  • config_id
  • account_id
  • status

Unity Catalog events

The following audit events are related to Unity Catalog. Delta Sharing events are also logged under the unityCatalog service. For Delta Sharing events, see Delta Sharing events. Unity Catalog events are logged at the account level, so workspace_id is recorded as 0. The originating workspace ID is included in request_params.workspace_id.

These events are logged under the service_name of unityCatalog.

action_name

Description

request_params

createMetastore

Account admin creates a metastore.

  • name
  • storage_root
  • workspace_id
  • metastore_id

getMetastore

Account admin requests metastore ID.

  • id
  • workspace_id
  • metastore_id

getMetastoreSummary

Account admin requests details about a metastore.

  • workspace_id
  • metastore_id

listMetastores

Account admin requests a list of all metastores in an account.

  • workspace_id

updateMetastore

Account admin makes an update to a metastore.

  • id
  • owner
  • workspace_id
  • metastore_id

deleteMetastore

Account admin deletes a metastore.

  • id
  • force
  • workspace_id
  • metastore_id

updateMetastoreAssignment

Account admin makes an update to a metastore's workspace assignment.

  • workspace_id
  • metastore_id
  • default_catalog_name

createExternalLocation

Account admin creates an external location.

  • name
  • skip_validation
  • url
  • credential_name
  • workspace_id
  • metastore_id

getExternalLocation

Account admin requests details about an external location.

  • name_arg
  • include_browse
  • workspace_id
  • metastore_id

listExternalLocations

Account admin request list of all external locations in an account.

  • url
  • max_results
  • workspace_id
  • metastore_id

updateExternalLocation

Account admin makes an update to an external location.

  • name_arg
  • owner
  • workspace_id
  • metastore_id

deleteExternalLocation

Account admin deletes an external location.

  • name_arg
  • force
  • workspace_id
  • metastore_id

createCatalog

User creates a catalog.

  • name
  • comment
  • workspace_id
  • metastore_id

deleteCatalog

User deletes a catalog.

  • name_arg
  • workspace_id
  • metastore_id

getCatalog

User requests details about a catalog.

  • name_arg
  • dependent
  • workspace_id
  • metastore_id

updateCatalog

User updates a catalog.

  • name_arg
  • isolation_mode
  • comment
  • workspace_id
  • metastore_id

listCatalog

User makes a call to list all catalogs in the metastore.

  • name_arg
  • workspace_id
  • metastore_id

createSchema

User creates a schema.

  • name
  • catalog_name
  • comment
  • workspace_id
  • metastore_id

deleteSchema

User deletes a schema.

  • full_name_arg
  • force
  • workspace_id
  • metastore_id

getSchema

User requests details about a schema.

  • full_name_arg
  • dependent
  • workspace_id
  • metastore_id

listSchema

User requests a list of all schemas in a catalog.

  • catalog_name

updateSchema

User updates a schema.

  • full_name_arg
  • name
  • workspace_id
  • metastore_id
  • comment

createStagingTable

  • name
  • catalog_name
  • schema_name
  • workspace_id
  • metastore_id

createTable

User creates a table. The request parameters differ depending on the type of table created.

  • name
  • data_source_format
  • catalog_name
  • schema_name
  • storage_location
  • columns
  • dry_run
  • table_type
  • view_dependencies
  • view_definition
  • sql_path
  • comment

deleteTable

User deletes a table.

  • full_name_arg
  • workspace_id
  • metastore_id

getTable

User requests details about a table.

  • include_delta_metadata
  • full_name_arg
  • dependent
  • workspace_id
  • metastore_id

privilegedGetTable

  • full_name_arg

listTables

User makes a call to list all tables in a schema.

  • catalog_name
  • schema_name
  • workspace_id
  • metastore_id
  • include_browse

listTableSummaries

User gets an array of summaries for tables for a schema and catalog within the metastore.

  • catalog_name
  • schema_name_pattern
  • workspace_id
  • metastore_id

updateTables

User makes an update to a table. The request parameters displayed vary depending on the type of table updates made.

  • full_name_arg
  • table_type
  • table_constraint_list
  • data_source_format
  • columns
  • dependent
  • row_filter
  • storage_location
  • sql_path
  • view_definition
  • view_dependencies
  • owner
  • comment
  • workspace_id
  • metastore_id

createStorageCredential

Account admin creates a storage credential. You might see an additional request parameter based on your cloud provider credentials.

  • name
  • comment
  • workspace_id
  • metastore_id

listStorageCredentials

Account admin makes a call to list all storage credentials in the account.

  • workspace_id
  • metastore_id

getStorageCredential

Account admin requests details about a storage credential.

  • name_arg
  • workspace_id
  • metastore_id

updateStorageCredential

Account admin makes an update to a storage credential.

  • name_arg
  • owner
  • workspace_id
  • metastore_id

deleteStorageCredential

Account admin deletes a storage credential.

  • name_arg
  • workspace_id
  • metastore_id

generateTemporaryTableCredential

Logged whenever a temporary credential is granted for a table. You can use this event to determine who queried what and when.

  • credential_id
  • credential_type
  • credential_kind
  • is_permissions_enforcing_client
  • table_full_name
  • operation
  • table_id
  • workspace_id
  • table_url
  • metastore_id

generateTemporaryPathCredential

Logged whenever a temporary credential is granted for a path.

  • url
  • operation
  • make_path_only_parent
  • credential_kind
  • fallback_enabled
  • workspace_id
  • metastore_id

checkPathAccess

Logged whenever user permissions are checked for a given path.

  • path
  • fallback_enabled

getPermissions

User makes a call to get permission details for a securable object. This call doesn't return inherited permissions, only explicitly assigned permissions.

  • securable_type
  • securable_full_name
  • workspace_id
  • metastore_id

getEffectivePermissions

User makes a call to get all permission details for a securable object. An effective permissions call returns both explicitly assigned and inherited permissions.

  • securable_type
  • securable_full_name
  • workspace_id
  • metastore_id

updatePermissions

User updates permissions on a securable object.

  • securable_type
  • changes
  • securable_full_name
  • workspace_id
  • metastore_id

metadataSnapshot

User queries the metadata from a previous table version.

  • securables
  • include_delta_metadata
  • workspace_id
  • metastore_id

metadataAndPermissionsSnapshot

User queries the metadata and permissions from a previous table version.

  • securables
  • include_delta_metadata
  • workspace_id
  • metastore_id

updateMetadataSnapshot

User updates the metadata from a previous table version.

  • table_list_snapshots
  • schema_list_snapshots
  • workspace_id
  • metastore_id

getForeignCredentials

User makes a call to get details about a foreign table.

  • securables
  • workspace_id
  • metastore_id

getInformationSchema

User makes a call to get details about a schema.

  • table_name
  • page_token
  • required_column_names
  • row_set_type
  • required_column_names
  • workspace_id
  • metastore_id

createConstraint

User creates a constraint for a table.

  • full_name_arg
  • constraint
  • workspace_id
  • metastore_id

deleteConstraint

User deletes a constraint for a table.

  • full_name_arg
  • constraint
  • workspace_id
  • metastore_id

createPipeline

User creates a Unity Catalog pipeline.

  • target_catalog_name
  • has_workspace_definition
  • id
  • workspace_id
  • metastore_id

updatePipeline

User updates a Unity Catalog pipeline.

  • id_arg
  • definition_json
  • id
  • workspace_id
  • metastore_id

getPipeline

User requests details about a Unity Catalog pipeline.

  • id
  • workspace_id
  • metastore_id

deletePipeline

User deletes a Unity Catalog pipeline.

  • id
  • workspace_id
  • metastore_id

deleteResourceFailure

Resource fails to delete

none

createVolume

User creates a Unity Catalog volume.

  • name
  • catalog_name
  • schema_name
  • volume_type
  • storage_location
  • owner
  • comment
  • workspace_id
  • metastore_id

getVolume

User makes a call to get information on a Unity Catalog volume.

  • volume_full_name
  • workspace_id
  • metastore_id

updateVolume

User updates a Unity Catalog volume's metadata with the ALTER VOLUME or COMMENT ON calls.

  • volume_full_name
  • name
  • owner
  • comment
  • workspace_id
  • metastore_id

deleteVolume

User deletes a Unity Catalog volume.

  • volume_full_name
  • workspace_id
  • metastore_id

listVolumes

User makes a call to get a list of all Unity Catalog volumes in a schema.

  • catalog_name
  • schema_name
  • workspace_id
  • metastore_id

generateTemporaryVolumeCredential

A temporary credential is granted for a volume.

  • volume_id
  • volume_full_name
  • operation
  • volume_storage_location
  • credential_id
  • credential_type
  • credential_kind
  • workspace_id
  • metastore_id

getTagSecurableAssignments

Tag assignments for a securable are fetched

  • securable_type
  • securable_full_name
  • workspace_id
  • metastore_id

getTagSubentityAssignments

Tag assignments for a subentity are fetched

  • securable_type
  • securable_full_name
  • workspace_id
  • metastore_id
  • subentity_name

UpdateTagSecurableAssignments

Tag assignments for a securable are updated

  • securable_type
  • securable_full_name
  • workspace_id
  • metastore_id
  • changes

UpdateTagSubentityAssignments

Tag assignments for a subentity are updated

  • securable_type
  • securable_full_name
  • workspace_id
  • metastore_id
  • subentity_name
  • changes

createRegisteredModel

User creates a Unity Catalog registered model.

  • name
  • catalog_name
  • schema_name
  • owner
  • comment
  • workspace_id
  • metastore_id

getRegisteredModel

User makes a call to get information on a Unity Catalog registered model.

  • full_name_arg
  • workspace_id
  • metastore_id

updateRegisteredModel

User updates a Unity Catalog registered model's metadata.

  • full_name_arg
  • name
  • owner
  • comment
  • workspace_id
  • metastore_id

deleteRegisteredModel

User deletes a Unity Catalog registered model.

  • full_name_arg
  • workspace_id
  • metastore_id

listRegisteredModels

User makes a call to get a list of Unity Catalog registered models in a schema, or list models across catalogs and schemas.

  • catalog_name
  • schema_name
  • max_results
  • page_token
  • workspace_id
  • metastore_id

createModelVersion

User creates a model version in Unity Catalog.

  • catalog_name
  • schema_name
  • model_name
  • source
  • comment
  • workspace_id
  • metastore_id

finalizeModelVersion

User makes a call to “finalize” a Unity Catalog model version after uploading model version files to its storage location, making it read-only and usable in inference workflows.

  • full_name_arg
  • version_arg
  • workspace_id
  • metastore_id

getModelVersion

User makes a call to get details on a model version.

  • full_name_arg
  • version_arg
  • workspace_id
  • metastore_id

getModelVersionByAlias

User makes a call to get details on a model version using the alias.

  • full_name_arg
  • include_aliases
  • alias_arg
  • workspace_id
  • metastore_id

updateModelVersion

User updates a model version's metadata.

  • full_name_arg
  • version_arg
  • name
  • owner
  • comment
  • workspace_id
  • metastore_id

deleteModelVersion

User deletes a model version.

  • full_name_arg
  • version_arg
  • workspace_id
  • metastore_id

listModelVersions

User makes a call to get a list of Unity Catalog model versions in a registered model.

  • catalog_name
  • schema_name
  • model_name
  • max_results
  • page_token
  • workspace_id
  • metastore_id

generateTemporaryModelVersionCredential

A temporary credential is generated when a user performs a write (during initial model version creaiton) or read (after the model version has been finalized) on a model version. You can use this event to determine who accessed a model version and when.

  • full_name_arg
  • version_arg
  • operation
  • model_version_url
  • credential_id
  • credential_type
  • credential_kind
  • workspace_id
  • metastore_id

setRegisteredModelAlias

User sets an alias on a Unity Catalog registered model.

  • full_name_arg
  • alias_arg
  • version

deleteRegisteredModelAlias

User deletes an alias on a Unity Catalog registered model.

  • full_name_arg
  • alias_arg

getModelVersionByAlias

User gets a Unity Catalog model version by alias.

  • full_name_arg
  • alias_arg

createConnection

A new foreign connection is created.

  • name
  • connection_type
  • workspace_id
  • metastore_id

deleteConnection

A foreign connection is deleted.

  • name_arg
  • workspace_id
  • metastore_id

getConnection

A foreign connection is retrieved.

  • name_arg
  • workspace_id
  • metastore_id

updateConnection

A foreign connection is updated.

  • name_arg
  • owner
  • workspace_id
  • metastore_id

listConnections

Foreign connections in a metastore are listed.

  • workspace_id
  • metastore_id

createFunction

User creates a new function.

  • function_info
  • workspace_id
  • metastore_id

updateFunction

User updates a function.

  • full_name_arg
  • owner
  • workspace_id
  • metastore_id

listFunctions

User requests a list of all functions within a specific parent catalog or schema.

  • catalog_name
  • schema_name
  • include_browse
  • workspace_id
  • metastore_id

getFunction

User requests a function from a parent catalog or schema.

  • full_name_arg
  • workspace_id
  • metastore_id

deleteFunction

User requests a function from a parent catalog or schema.

  • full_name_arg
  • workspace_id
  • metastore_id

generateTemporaryServiceCredential

A temporary credential is generated to access a cloud service account from Databricks.

  • credential_id
  • credential_type
  • credential_kind
  • workspace_id
  • metastore_id

UpdateWorkspaceBindings

A metastore admin or object owner updates the workspace bindings of a catalog, external location, or storage credential.

  • securable_type
  • securable_full_name
  • add: Only logged when binding is assigned. Includes a list of workspace IDs and the binding type.
  • remove: Only logged when a binding is unassigned. Includes workspace IDs of affected workspaces.
  • workspace_id
  • metastore_id

CreateSecurableTagAssignment

A tag assignment is created on a securable.

  • securable_type
  • tag_value
  • securable_full_name
  • workspace_id
  • tag_key
  • metastore_id

CreateSubsecurableTagAssignment

A tag assignment is created on a subsecurable.

  • securable_type
  • tag_value
  • subsecurable_name
  • securable_full_name
  • subsecurable_type
  • workspace_id
  • tag_key
  • metastore_id

DeleteSecurableTagAssignment

A tag assignment on a securable is deleted.

  • securable_type
  • securable_full_name
  • workspace_id
  • tag_key
  • metastore_id

DeleteSubsecurableTagAssignment

A tag assignment on a subsecurable is deleted.

  • securable_type
  • subsecurable_name
  • securable_full_name
  • subsecurable_type
  • workspace_id
  • tag_key
  • metastore_id

ListSecurableTagAssignments

A user requests a list of tag assignments on a securable.

  • securable_type
  • securable_full_name
  • workspace_id
  • metastore_id

ListSubsecurableTagAssignments

A user requests a list of tag assignments on a subsecurable.

  • securable_type
  • subsecurable_name
  • securable_full_name
  • subsecurable_type
  • workspace_id
  • metastore_id

createEntityTagAssignment

A tag assignment is created on a Unity Catalog entity.

  • entity_name
  • entity_type
  • tag_key
  • tag_value
  • workspace_id
  • metastore_id

getEntityTagAssignment

A user requests details of a tag assignment on a Unity Catalog entity.

  • entity_name
  • entity_type
  • tag_key
  • include_inherited
  • workspace_id
  • metastore_id

listEntityTagAssignments

A user requests a list of tag assignments on a Unity Catalog entity.

  • entity_name
  • entity_type
  • max_results
  • include_inherited
  • workspace_id
  • metastore_id

updateEntityTagAssignment

A tag assignment on a Unity Catalog entity is updated.

  • entity_name
  • entity_type
  • tag_key
  • tag_value
  • workspace_id
  • metastore_id

deleteEntityTagAssignment

A tag assignment on a Unity Catalog entity is deleted.

  • entity_name
  • entity_type
  • tag_key
  • workspace_id
  • metastore_id

listSecurableTags

A user requests a list of tags on a securable.

  • workspace_id
  • metastore_id

createPolicy

ABAC policy is created.

  • policy_info
  • workspace_id
  • metastore_id

deletePolicy

ABAC policy is deleted.

  • name
  • on_securable_type
  • on_securable_fullname
  • workspace_id
  • metastore_id

getPolicy

User requests details about an ABAC policy.

  • name
  • on_securable_type
  • on_securable_fullname
  • workspace_id
  • metastore_id

listPolicies

User requests a list of ABAC policies.

  • include_inherited
  • on_securable_type
  • on_securable_fullname
  • max_results
  • workspace_id
  • metastore_id

updatePolicy

ABAC policy is updated.

  • name
  • policy_info
  • on_securable_type
  • on_securable_fullname
  • workspace_id
  • metastore_id

GetWorkspaceBindings

User requests workspace binding details for a securable object.

  • securable_type
  • securable_full_name
  • max_results
  • workspace_id
  • metastore_id

UpdateCatalogWorkspaceBindings

User updates workspace bindings for a catalog.

  • catalog_name
  • assign_workspaces
  • workspace_id
  • metastore_id

createCredential

User creates a storage or service credential.

  • name
  • credential_id
  • credential_type
  • purpose
  • comment
  • credential_kind
  • workspace_id
  • metastore_id

deleteCredential

User deletes a storage or service credential.

  • name_arg
  • workspace_id
  • metastore_id

getCredential

User requests details about a storage or service credential.

  • credential_id
  • name_arg
  • credential_type
  • credential_kind
  • workspace_id
  • metastore_id

listCredentials

User requests a list of storage and service credentials.

  • max_results
  • workspace_id
  • metastore_id

updateCredential

User updates a storage or service credential.

  • name_arg
  • name
  • owner
  • workspace_id
  • metastore_id

validateCredential

User validates a storage or service credential.

  • external_location_name
  • url
  • read_only
  • credential_name
  • workspace_id
  • metastore_id

createStorageLocation

User creates a storage location.

  • storage_info
  • workspace_id
  • metastore_id

createMetastoreAssignment

Admin assigns a metastore to a workspace.

  • input_workspace_id
  • input_metastore_id
  • metastore_id

deleteMetastoreAssignment

Admin removes a metastore assignment from a workspace.

  • input_workspace_id
  • input_metastore_id
  • metastore_id

getCurrentMetastoreAssignment

User requests current metastore assignment details.

  • workspace_id
  • metastore_id

enableSystemSchema

Admin enables a system schema.

  • schema
  • metastore_id
  • workspace_id

disableSystemSchema

Admin disables a system schema.

  • schema
  • metastore_id
  • workspace_id

listSystemSchemas

User requests a list of system schemas.

  • metastore_id
  • workspace_id

getQuota

User requests details about a resource quota.

  • quota_name
  • parent_full_name
  • parent_securable_type
  • workspace_id
  • metastore_id

listQuotas

User requests a list of resource quotas.

  • max_results
  • workspace_id
  • metastore_id

getTableById

User requests table details by table ID.

  • table_id
  • workspace_id
  • metastore_id

listDroppedTables

User requests a list of dropped tables.

  • catalog_name
  • page_token
  • schema_name
  • max_results
  • workspace_id
  • metastore_id

tableExists

User checks if a table exists.

  • full_name_arg
  • dependent
  • workspace_id
  • metastore_id

undropTable

User restores a dropped table.

  • full_name_arg
  • workspace_id
  • metastore_id

updateTableToManaged

User converts an external table to a managed table.

  • is_rollback_to_external
  • full_name_arg
  • entity_storage_location_id
  • workspace_id
  • metastore_id

listAllVolumesInMetastore

User requests a list of all volumes in a metastore.

  • page_token
  • workspace_id
  • metastore_id

getArtifactAllowlist

User requests details about the artifact allowlist.

  • artifact_type
  • workspace_id
  • metastore_id

setArtifactAllowlist

User updates the artifact allowlist.

  • artifact_matchers
  • artifact_type
  • workspace_id
  • metastore_id

updateMLServingPermissions

Service principal is granted permissions to deploy a model.

  • securable_kind
  • securable_type
  • version
  • operation
  • securable_full_name
  • service_principal_id
  • workspace_id
  • metastore_id

Delta Sharing events

Delta Sharing events are broken up into two sections: events recorded in the data provider's account and events recorded in the data recipient's account.

To learn how to use audit logs to monitor Delta Sharing events, see Audit and monitor data sharing.

Delta Sharing provider events

These audit log events are logged in the provider's account. Actions that are performed by recipients start with the deltaSharing prefix. Each of these logs also includes request_params.metastore_id, which is the metastore that manages the shared data, and userIdentity.email, which is the ID of the user who initiated the activity.

These events are logged under the service_name of unityCatalog.

action_name

Description

request_params

deltaSharingListShares

A data recipient requests a list of shares.

  • options: The pagination options provided with this request.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingGetShare

A data recipient requests details about a shares.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingListSchemas

A data recipient requests a list of shared schemas.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • options: The pagination options provided with this request.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingListAllTables

A data recipient requests a list of all shared tables.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingListTables

A data recipient requests a list of shared tables.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • options: The pagination options provided with this request.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingGetTableMetadata

A data recipient requests a details about a table's metadata.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • schema: The name of the schema.
  • name: The name of the table.
  • predicateHints: The predicates included in the query.
  • limitHints: The maximum number of rows to return.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingGetTableVersion

A data recipient requests a details about a table version.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • schema: The name of the schema.
  • name: The name of the table.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingQueryTable

Logged when a data recipient queries a shared table.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • schema: The name of the schema.
  • name: The name of the table.
  • predicateHints: The predicates included in the query.
  • limitHints: The maximum number of rows to return.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingQueryTableChanges

Logged when a data recipient queries change data for a table.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • schema: The name of the schema.
  • name: The name of the table.
  • cdf_options: Change data feed options.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingQueriedTable

Logged after a data recipient gets a response to their query. The response.result field includes more information on the recipient's query (see Audit and monitor data sharing)

  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingQueriedTableChanges

Logged after a data recipient gets a response to their query. The response.result field includes more information on the recipient's query (see Audit and monitor data sharing).

  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingListNotebookFiles

A data recipient requests a list of shared notebook files.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingQueryNotebookFile

A data recipient queries a shared notebook file.

  • file_name: The name of the notebook file.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingListFunctions

A data recipient requests a list of functions in a parent schema.

  • share: The name of the share.
  • schema: The name of the parent schema of the function.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingListAllFunctions

A data recipient requests a list of all shared functions.

  • share: The name of the share.
  • schema: The name of the parent schema of the function.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingListFunctionVersions

A data recipient requests a list of function versions.

  • share: The name of the share.
  • schema: The name of the parent schema of the function.
  • function: The name of the function.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingListVolumes

A data recipient requests a list of shared volumes in a schema.

  • share: The name of the share.
  • schema: The parents schema of the volumes.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

deltaSharingListAllVolumes

A data recipient requests all shared volumes.

  • share: The name of the share.
  • recipient_name: Indicates the recipient executing the action.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

updateMetastore

Provider updates their metastore.

  • delta_sharing_scope: Values can be INTERNAL or INTERNAL_AND_EXTERNAL.
  • delta_sharing_recipient_token_lifetime_in_seconds: If present, indicates that the recipient token lifetime was updated.

createRecipient

Provider creates a data recipient.

  • name: The name of the recipient.
  • comment: The comment for the recipient.
  • ip_access_list.allowed_ip_addresses: Recipient IP address allowlist.

deleteRecipient

Provider deletes a data recipient.

  • name: The name of the recipient.

getRecipient

Provider requests details about a data recipient.

  • name: The name of the recipient.

listRecipients

Provider requests a list of all their data recipients.

none

rotateRecipientToken

Provider rotates a recipient's token.

  • name: The name of the recipient.
  • comment: The comment given in the rotation command.

updateRecipient

Provider updates a data recipient's attributes.

  • name: The name of the recipient.
  • updates: A JSON representation of recipient attributes that were added or removed from the share.

createShare

Provider updates a data recipient's attributes.

  • name: The name of the share.
  • comment: The comment for the share.

deleteShare

Provider updates a data recipient's attributes.

  • name: The name of the share.

getShare

Provider requests details about a share.

  • name: The name of the share.
  • include_shared_objects: Whether the share's table names were included in the request.

updateShare

Provider adds or removes data assets from a share.

  • name: The name of the share.
  • updates: A JSON representation of data assets that were added or removed from the share. Each item includes action (add or remove), name (the actual name of the table), shared_as (the name the asset was shared as, if different from the actual name), and partition_specification (if a partition specification was provided).

listShares

Provider requests a list of their shares.

none

getSharePermissions

Provider requests details on a share's permissions.

  • name: The name of the share.

updateSharePermissions

Provider updates a share's permissions.

  • name: The name of the share.
  • changes: A JSON representation of the updated permissions. Each change includes principal (the user or group to whom permission is granted or revoked), add (the list of permissions that were granted), and remove (the list of permissions that were revoked).

getRecipientSharePermissions

Provider requests details about a recipient's share permissions.

  • name: The name of the share.

getActivationUrlInfo

Provider requests details about activity on their activation link.

  • recipient_name: The name of the recipient who opened the activation URL.
  • is_ip_access_denied: None if there is no IP access list configured. Otherwise, true if the request was denied and false if the request was not denied. sourceIPaddress is the recipient IP address.

generateTemporaryVolumeCredential

Temporary credential is generated for the recipient to access a shared volume.

  • share_name: The name of the share through which the recipient requests.
  • share_id: The ID of the share.
  • share_owner: The owner of the share.
  • recipient_name: The name of the recipient who requests the credential.
  • recipient_id: The ID of the recipient.
  • volume_full_name: The full 3-level name of the volume.
  • volume_id: The ID of the volume.
  • volume_storage_location: The cloud path of the volume root.
  • operation: Either READ_VOLUME or WRITE_VOLUME. For volume sharing, only READ_VOLUME is supported.
  • credential_id: The ID of the credential.
  • credential_type: The type of the credential. Value is either StorageCredential or ServiceCredential.
  • credential_kind: The method used to authorize access.
  • workspace_id: Value is always 0 when the request is for shared volumes.

generateTemporaryTableCredential

Temporary credential is generated for the recipient to access a shared table.

  • share_name: The name of the share through which the recipient requests.
  • share_id: The ID of the share.
  • share_owner: The owner of the share.
  • recipient_name: The name of the recipient who requests the credential.
  • recipient_id: The ID of the recipient.
  • table_full_name: The full 3-level name of the table.
  • table_id: The ID of the table.
  • table_url: The cloud path of the table root.
  • operation: Either READ or READ_WRITE.
  • credential_id: The ID of the credential.
  • credential_type: The type of the credential. Value is either StorageCredential or ServiceCredential.
  • credential_kind: The method used to authorize access.
  • workspace_id: Value is always 0 when the request is for shared tables.

createRecipientOidcPolicy

Provider creates an OIDC federation policy for a recipient.

  • recipient_name
  • policy

deleteRecipientOidcPolicy

Provider deletes an OIDC federation policy for a recipient.

  • recipient_name
  • name
  • workspace_id
  • metastore_id

deleteRecipientPolicy

Provider deletes a recipient policy.

  • recipient_name
  • name
  • workspace_id
  • metastore_id

getRecipientOidcPolicy

Provider requests details about a recipient's OIDC federation policy.

  • recipient_name
  • name
  • workspace_id
  • metastore_id

getRecipientPropertiesByDependentId

Provider requests recipient properties for a dependent object.

  • dependent
  • property_keys
  • workspace_id
  • metastore_id

listRecipientOidcPolicies

Provider requests a list of OIDC federation policies for a recipient.

  • recipient_name
  • workspace_id
  • metastore_id

reconnectRecipientAccount

Provider reconnects a Databricks-to-Databricks recipient account.

  • recipient
  • metastore_id

retrieveRecipientToken

Recipient retrieves their bearer token for open sharing authentication.

  • recipient_name
  • is_ip_access_denied
  • metastore_id

deltaSharingGetQueryInfo

Provider requests query information for a shared table.

  • name
  • recipient_authentication_type
  • recipient_global_metastore_id
  • recipient_name
  • share_id
  • user_agent
  • is_ip_access_denied
  • share
  • schema
  • query_id
  • share_name
  • recipient_id
  • workspace_id
  • metastore_id

deltaSharingReconciliation

Delta Sharing performs reconciliation for a shared table.

  • tableType
  • tableDataSourceFormat
  • tableUrl
  • schemaId
  • tableFullName
  • accountId
  • metastoreId
  • securableId
  • catalogId
  • opType
  • workspace_id
  • metastore_id

addShareToCatalog

Recipient mounts a share to a catalog.

  • catalog_name
  • provider_name
  • share_name
  • workspace_id
  • metastore_id

listSharesInCatalog

User requests a list of shares mounted in a catalog.

  • catalog_name
  • workspace_id
  • metastore_id

removeShareFromCatalog

Recipient unmounts a share from a catalog.

  • catalog_name
  • provider_name
  • share_name
  • workspace_id
  • metastore_id

listProviderShareAssets

User requests a list of assets in a provider's share.

  • provider_name_arg
  • share_name_arg
  • workspace_id
  • metastore_id

listInboundSharedNotebookFiles

Recipient requests a list of notebook files shared in a catalog.

  • catalog_name
  • workspace_id
  • metastore_id

getInboundSharedNotebookFile

Recipient requests details about a shared notebook file.

  • catalog_name
  • notebook_file_name_arg
  • workspace_id
  • metastore_id

listSharedCatalogs

Provider requests a list of shared catalogs.

  • provider_ids
  • workspace_id
  • metastore_id

Delta Sharing recipient events

These events are logged in the data recipient's account. These events record recipient access of shared data and AI assets, along with events associated with the management of providers. Each of these events also includes the following request parameters:

  • recipient_name: The name of the recipient in the data provider's system.
  • metastore_id: The name of the metastore in the data provider's system.
  • sourceIPAddress: The IP address where the request originated.

These events are logged under the service_name of unityCatalog.

action_name

Description

request_params

deltaSharingProxyGetTableVersion

A data recipient requests details on a shared table version.

  • share_name: The name of the share.
  • catalog_name: The name of the catalog mounted to the share.
  • schema: The name of the table's parent schema.
  • name: The name of the table.

deltaSharingProxyGetTableMetadata

A data recipient requests details on a shared table's metadata.

  • share_name: The name of the share.
  • catalog_name: The name of the catalog mounted to the share.
  • schema: The name of the table's parent schema.
  • name: The name of the table.

deltaSharingProxyQueryTable

A data recipient queries a shared table.

  • share_name: The name of the share.
  • catalog_name: The name of the catalog mounted to the share.
  • schema: The name of the table's parent schema.
  • name: The name of the table.
  • limitHints: The maximum number of rows to return.
  • predicateHints: The predicates included in the query.
  • version: Table version, if change data feed is enabled.

deltaSharingProxyQueryTableChanges

A data recipient queries change data for a table.

  • share_name: The name of the share.
  • catalog_name: The name of the catalog mounted to the share.
  • schema: The name of the table's parent schema.
  • name: The name of the table.
  • cdf_options: Change data feed options.

createProvider

A data recipient creates a provider object.

  • name: The name of the provider.
  • comment: The comment for the provider.

updateProvider

A data recipient updates a provider object.

  • name: The name of the provider.
  • updates: A JSON representation of provider attributes that were added or removed from the share. Each item includes action (add or remove) and can include name (the new provider name), owner (new owner), and comment.

deleteProvider

A data recipient deletes a provider object.

  • name: The name of the provider.

getProvider

A data recipient requests details about a provider object.

  • name: The name of the provider.

listProviders

A data recipient requests a list of providers.

none

activateProvider

A data recipient activates a provider object.

  • name: The name of the provider.

listProviderShares

A data recipient requests a list of a provider's shares.

  • name: The name of the provider.

Delta Sharing external Iceberg client events

Preview

This feature is in Public Preview.

These events are logged at the account level for external Iceberg clients accessing shared data using the Apache Iceberg REST Catalog API. To learn more, see Enable sharing to external Iceberg clients.

These events are logged when external Iceberg clients (such as Snowflake or other non-Databricks systems) access shared data.

These events are logged under the service_name of dataSharing.

action_name

Description

request_params

icebergGetConfig

An external Iceberg client requests configuration information.

  • recipient_id
  • recipient_name
  • recipient_authentication_type
  • user_agent
  • share_id
  • share_name
  • namespace_name
  • table_name
  • metastore_id

icebergListNamespaces

An external Iceberg client requests a list of namespaces.

  • recipient_id
  • recipient_name
  • recipient_authentication_type
  • user_agent
  • share_id
  • share_name
  • namespace_name
  • table_name
  • metastore_id

icebergGetNamespace

An external Iceberg client requests details about a namespace.

  • recipient_id
  • recipient_name
  • recipient_authentication_type
  • user_agent
  • share_id
  • share_name
  • namespace_name
  • table_name
  • metastore_id

icebergListTables

An external Iceberg client requests a list of tables in a namespace.

  • recipient_id
  • recipient_name
  • recipient_authentication_type
  • user_agent
  • share_id
  • share_name
  • namespace_name
  • table_name
  • metastore_id

icebergLoadTable

An external Iceberg client loads table metadata.

  • recipient_id
  • recipient_name
  • recipient_authentication_type
  • user_agent
  • share_id
  • share_name
  • namespace_name
  • table_name
  • metastore_id

icebergReportMetrics

An external Iceberg client reports metrics.

  • recipient_id
  • recipient_name
  • recipient_authentication_type
  • user_agent
  • share_id
  • share_name
  • namespace_name
  • table_name
  • metastore_id

Clean Rooms events

These events are logged at the account level. These events are related to Clean Rooms.

These events are logged under the service_name of clean-room.

action_name

Description

request_params

createCleanRoom

A user in your Databricks account creates a new clean room using the UI or API.

  • clean_room_name
  • cloud_vendor
  • collaborators
  • metastore_id
  • region
  • workspace_id

createCleanRoomAsset

A user in your account creates a clean room asset.

  • asset
  • clean_room_name

createCleanRoomAssetReview

A user in your Databricks account creates a review for a clean room asset using the UI or API. Currently, only notebooks are reviewable.

  • clean_room_name
  • asset_full_name
  • notebook_review
  • asset_type

createCleanRoomAutoApprovalRule

A user in your Databricks account creates an auto-approval rule for a clean room using the UI or API. The response includes a rule_id that is referenced in the clean_room_events system table.

  • clean_room_name
  • auto_approval_rule

createCleanRoomOutputCatalog

A user in your Databricks account creates an output table in a clean room using the UI or API.

  • clean_room_name
  • output_catalog_name
  • metastore_id
  • workspace_id

deleteCleanRoom

A user in your Databricks account deletes a clean room using the UI or API.

  • clean_room_name
  • metastore_id
  • workspace_id

deleteCleanRoomAsset

A user in your account deletes a clean room asset.

  • asset_full_name
  • asset_type
  • clean_room_name

deleteCleanRoomAutoApprovalRule

A user in your Databricks account deletes an auto-approval rule for a clean room using the UI or API.

  • clean_room_name
  • rule_id

getCleanRoom

A user in your account gets details about a clean room using the UI or API.

  • clean_room_name
  • metastore_id
  • workspace_id

getCleanRoomAsset

A user in your account views details about a clean room's data asset using the UI.

  • asset_full_name
  • metastore_id
  • workspace_id
  • asset_type
  • clean_room_name
  • collaborator_global_metastore_id

listCleanRoomAssets

A user gets a list of assets within a clean room.

  • clean_room_name

listCleanRoomAutoApprovalRules

A user in your Databricks account lists auto-approval rules for a clean room using the UI or API.

  • clean_room_name

listCleanRoomNotebookTaskRuns

A user gets a list of notebook task runs within a clean room.

  • clean_room_name
  • notebook_name

listCleanRooms

A user gets a list of all clean rooms using the workspace UI or all clean rooms in the metastore using the API.

  • metastore_id
  • workspace_id

updateCleanRoom

A user in your account updates a clean room's details or assets.

  • added_assets
  • clean_room_name
  • owner
  • metastore_id
  • workspace_id
  • updated_assets
  • removed_assets

updateCleanRoomAsset

A user in your account updates a clean room asset.

  • asset
  • clean_room_name

Additional security monitoring events

For Databricks compute resources in the classic compute plane, such as VMs for clusters and pro or classic SQL warehouses, the following features enable additional monitoring agents:

For serverless compute resources, the monitoring agents run if the compliance security profile is enabled and the complaince standard supports serverless compute resources. See Classic and serverless compute support by region and Compliance standards with serverless and standard compute availability.

File integrity monitoring events

These events are logged at the workspace level. This service includes events related to file integrity monitoring.

These events are logged under the service_name of capsule8-alerts-dataplane.

action_name

Description

request_params

Heartbeat

A regular event to confirm the monitor is on. Currently runs every 10 minutes.

  • instanceId

Memory Marked Executable

Memory is often marked executable in order to allow malicious code to execute when an application is being exploited. Alerts when a program sets heap or stack memory permissions to executable. This can cause false positives for certain application servers.

  • instanceId

File Integrity Monitor

Monitors the integrity of important system files. Alerts on any unauthorized changes to those files. Databricks defines specific sets of system paths on the image, and this set of paths might change over time.

  • instanceId

Systemd Unit File Modified

Changes to systemd units could result in security controls being relaxed or disabled, or the installation of a malicious service. Alerts whenever a systemd unit file is modified by a program other than systemctl.

  • instanceId

Repeated Program Crashes

Repeated program crashes could indicate that an attacker is attempting to exploit a memory corruption vulnerability, or that there is a stability issue in the affected application. Alerts when more than 5 instances of an individual program crash via segmentation fault.

  • instanceId

Userfaultfd Usage

As containers are typically static workloads, this alert could indicate that an attacker has compromised the container and is attempting to install and run a backdoor. Alerts when a file that has been created or modified within 30 minutes is then executed within a container.

  • instanceId

New File Executed in Container

Memory is often marked executable in order to allow malicious code to execute when an application is being exploited. Alerts when a program sets heap or stack memory permissions to executable. This can cause false positives for certain application servers.

  • instanceId

Suspicious Interactive Shell

Interactive shells are rare occurrences on modern production infrastructure. Alerts when an interactive shell is started with arguments commonly used for reverse shells.

  • instanceId

User Command Logging Evasion

Evading command logging is common practice for attackers, but might also indicate that a legitimate user is performing unauthorized actions or trying to evade policy. Alerts when a change to user command history logging is detected, indicating that a user is attempting to evade command logging.

  • instanceId

BPF Program Executed

Detects some types of kernel backdoors. The loading of a new Berkeley Packet Filter (BPF) program could indicate that an attacker is loading a BPF-based rootkit to gain persistence and avoid detection. Alerts when a process loads a new privileged BPF program, if the process that is already part of an ongoing incident.

  • instanceId

Kernel Module Loaded

Attackers commonly load malicious kernel modules (rootkits) to evade detection and maintain persistence on a compromised node. Alerts when a kernel module is loaded, if the program is already part of an ongoing incident.

  • instanceId

Suspicious Program Name Executed-Space After File

Attackers might create or rename malicious binaries to include a space at the end of the name in an effort to impersonate a legitimate system program or service. Alerts when a program is executed with a space after the program name.

  • instanceId

Illegal Elevation Of Privileges

Kernel privilege escalation exploits commonly enable an unprivileged user to gain root privileges without passing standard gates for privilege changes. Alerts when a program attempts to elevate privileges through unusual means. This can issue false positive alerts on nodes with significant workloads.

  • instanceId

Kernel Exploit

Internal kernel functions are not accessible to regular programs, and if called, are a strong indicator that a kernel exploit has executed and that the attacker has full control of the node. Alerts when a kernel function unexpectedly returns to user space.

  • instanceId

Processor-Level Protections Disabled

SMEP and SMAP are processor-level protections that increase difficulty for kernel exploits to succeed, and disabling these restrictions is a common early step in kernel exploits. Alerts when a program tampers with the kernel SMEP/SMAP configuration.

  • instanceId

Container Escape via Kernel Exploitation

Alerts when a program uses kernel functions commonly used in container escape exploits, indicating that an attacker is escalating privileges from container-access to node-access.

  • instanceId

Privileged Container Launched

Privileged containers have direct access to host resources, leading to a greater impact when compromised. Alerts when a privileged container is launched, if the container isn't a known privileged image such as kube-proxy. This can issue unwanted alerts for legitimate privileged containers.

  • instanceId

Userland Container Escape

Many container escapes coerce the host to execute an in-container binary, resulting in the attacker gaining full control of the affected node. Alerts when a container-created file is executed from outside a container.

  • instanceId

AppArmor Disabled In Kernel

Modification of certain AppArmor attributes can only occur in-kernel, indicating that AppArmor has been disabled by a kernel exploit or rootkit. Alerts when the AppArmor state is changed from the AppArmor configuration detected when the sensor starts.

  • instanceId

AppArmor Profile Modified

Attackers might attempt to disable enforcement of AppArmor profiles as part of evading detection. Alerts when a command for modifying an AppArmor profile is executed, if it was not executed by a user in an SSH session.

  • instanceId

Boot Files Modified

If not performed by a trusted source (such as a package manager or configuration management tool), modification of boot files could indicate an attacker modifying the kernel or its options in order to gain persistent access to a host. Alerts when changes are made to files in /boot, indicating installation of a new kernel or boot configuration.

  • instanceId

Log Files Deleted

Log deletion not performed by a log management tool could indicate that an attacker is trying to remove indicators of compromise. Alerts on deletion of system log files.

  • instanceId

New File Executed

Newly created files from sources other than system update programs might be backdoors, kernel exploits, or part of an exploitation chain. Alerts when a file that has been created or modified within 30 minutes is then executed, excluding files created by system update programs.

  • instanceId

Root Certificate Store Modified

Modification of the root certificate store could indicate the installation of a rogue certificate authority, enabling interception of network traffic or bypass of code signature verification. Alerts when a system CA certificate store is changed.

  • instanceId

Setuid/Setgid Bit Set On File

Setting setuid/setgid bits can be used to provide a persistent method for privilege escalation on a node. Alerts when the setuid or setgid bit is set on a file with the chmod family of system calls.

  • instanceId

Hidden File Created

Attackers often create hidden files as a means of obscuring tools and payloads on a compromised host. Alerts when a hidden file is created by a process associated with an ongoing incident.

  • instanceId

Modification Of Common System Utilities

Attackers might modify system utilities in order to execute malicious payloads whenever these utilities are run. Alerts when a common system utility is modified by an unauthorized process.

  • instanceId

Network Service Scanner Executed

An attacker or rogue user might use or install these programs to survey connected networks for additional nodes to compromise. Alerts when common network scanning program tools are executed.

  • instanceId

Network Service Created

Attackers might start a new network service to provide easy access to a host after compromise. Alerts when a program starts a new network service, if the program is already part of an ongoing incident.

  • instanceId

Network Sniffing Program Executed

An attacker or rogue user might execute network sniffing commands to capture credentials, personally-identifiable information (PII), or other sensitive information. Alerts when a program is executed that allows network capture.

  • instanceId

Remote File Copy Detected

Use of file transfer tools could indicate that an attacker is attempting to move toolsets to additional hosts or exfiltrate data to a remote system. Alerts when a program associated with remote file copying is executed, if the program is already part of an ongoing incident.

  • instanceId

Unusual Outbound Connection Detected

Command and Control channels and cryptocoin miners often create new outbound network connections on unusual ports. Alerts when a program initiates a new connection on an uncommon port, if the program is already part of an ongoing incident.

  • instanceId

Data Archived Via Program

After gaining access to a system, an attacker might create a compressed archive of files to reduce the size of data for exfiltration. Alerts when a data compression program is executed, if the program is already part of an ongoing incident.

  • instanceId

Process Injection

Use of process injection techniques commonly indicates that a user is debugging a program, but might also indicate that an attacker is reading secrets from or injecting code into other processes. Alerts when a program uses ptrace (debugging) mechanisms to interact with another process.

  • instanceId

Account Enumeration Via Program

Attackers often use account enumeration programs to determine their level of access and to see if other users are currently logged in to the node. Alerts when a program associated with account enumeration is executed, if the program is already part of an ongoing incident.

  • instanceId

File and Directory Discovery Via Program

Exploring file systems is common post-exploitation behavior for an attacker looking for credentials and data of interest. Alerts when a program associated with file and directory enumeration is executed, if the program is already part of an ongoing incident.

  • instanceId

Network Configuration Enumeration Via Program

Attackers can interrogate local network and route information to identify adjacent hosts and networks ahead of lateral movement. Alerts when a program associated with network configuration enumeration is executed, if the program is already part of an ongoing incident.

  • instanceId

Process Enumeration Via Program

Attackers often list running programs in order to identify the purpose of a node and whether any security or monitoring tools are in place. Alerts when a program associated with process enumeration is executed, if the program is already part of an ongoing incident.

  • instanceId

System Information Enumeration Via Program

Attackers commonly execute system enumeration commands to determine Linux kernel and distribution versions and features, often to identify if the node is affected by specific vulnerabilities. Alerts when a program associated with system information enumeration is executed, if the program is already part of an ongoing incident.

  • instanceId

Scheduled Tasks Modified Via Program

Modifying scheduled tasks is a common method for establishing persistence on a compromised node. Alerts when the crontab, at, or batch commands are used to modify scheduled task configurations.

  • instanceId

Systemctl Usage Detected

Changes to systemd units could result in security controls being relaxed or disabled, or the installation of a malicious service. Alerts when the systemctl command is used to modify systemd units.

  • instanceId

User Execution Of su Command

Explicit escalation to the root user decreases the ability to correlate privileged activity to a specific user. Alerts when the su command is executed.

  • instanceId

User Execution Of sudo Command

Alerts when the sudo command is executed.

  • instanceId

User Command History Cleared

Deleting the history file is unusual, commonly performed by attackers hiding activity, or by legitimate users intending to evade audit controls. Alerts when command line history files are deleted.

  • instanceId

New System User Added

An attacker might add a new user to a host to provide a reliable method of access. Alerts if a new user entity is added to the local account management file /etc/passwd, if the entity is not added by a system update program.

  • instanceId

Password Database Modification

Attackers might directly modify identity-related files to add a new user to the system. Alerts when a file related to user passwords is modified by a program unrelated to updating existing user information.

  • instanceId

SSH Authorized Keys Modification

Adding a new SSH public key is a common method for gaining persistent access to a compromised host. Alerts when an attempt to write to a user's SSH authorized_keys file is observed, if the program is already part of an ongoing incident.

  • instanceId

User Account Created Via CLI

Adding a new user is a common step for attackers when establishing persistence on a compromised node. Alerts when an identity management program is executed by a program other than a package manager.

  • instanceId

User Configuration Changes

Deleting the history file is unusual, commonly performed by attackers hiding activity, or by legitimate users intending to evade audit controls. Alerts when command line history files are deleted.

  • instanceId

New System User Added

User profile and configuration files are often modified as a method of persistence in order to execute a program whenever a user logs in. Alerts when .bash_profile and bashrc (as well as related files) are modified by a program other than a system update tool.

  • instanceId

Antivirus monitoring events

note

The response JSON object in these audit logs always has a result field that includes one line of the original scan result. Each scan result is represented typically by multiple audit log records, one for each line of the original scan output. For details of what could appear in this file, see the following third-party documentation.

The following event is logged at the workspace level.

These events are logged under the service_name of clamAVScanService-dataplane.

action_name

Description

request_params

clamAVScanAction

The antivirus monitoring performs a scan. A log will generate for each line of the original scan output.

  • instanceId

System log events

note

The response JSON object in the audit log has a result field that includes the original system log content.

The following event is logged at the workspace level.

These events are logged under the service_name of syslog.

action_name

Description

request_params

processEvent

The system log processes an event.

  • instanceId
  • processName

Process monitor log events

These events are logged at the workspace level.

These events are logged under the service_name of monit.

action_name

Description

request_params

processNotRunning

The monitor is not running.

  • instanceId
  • processName

processRestarting

The monitor is restarting.

  • instanceId
  • processName

processStarted

The monitor started.

  • instanceId
  • processName

processRunning

The monitor is running.

  • instanceId
  • processName

SQL table access events

note

The sqlPermissions service includes events related to the legacy Hive metastore table access control. Databricks recommends that you upgrade the tables managed by the Hive metastore to the Unity Catalog metastore.

These events are logged at the workspace level.

These events are logged under the service_name of sqlPermissions.

action_name

Description

request_params

changeSecurableOwner

Workspace admin or owner of an object transfers object ownership.

  • securable
  • principal

createSecurable

User creates a securable object.

  • securable

denyPermission

Object owner denies privileges on a securable object.

  • permission

grantPermission

Object owner grants permission on a securable object.

  • permission

removeAllPermissions

User drops a securable object.

  • securable

renameSecurable

User renames a securable object.

  • before
  • after

requestPermissions

User requests permissions on a securable object.

  • requests
  • denied
  • permitted

revokePermission

Object owner revokes permissions on their securable object.

  • permission

showPermissions

User views securable object permissions.

  • securable
  • principal

Deprecated log events

Databricks has deprecated the following serverlessRealTimeInference audit events. These events were associated with Legacy MLflow Model Serving, which reached end of life on September 15, 2025.

  • enable
  • disable

Databricks has deprecated the following databrickssql audit events:

  • createAlertDestination (now createNotificationDestination)
  • deleteAlertDestination (now deleteNotificationDestination)
  • updateAlertDestination (now updateNotificationDestination)
  • muteAlert
  • unmuteAlert

SQL endpoint logs

If you create SQL warehouses using the deprecated SQL endpoint API (the former name for SQL warehouses), the corresponding audit event name will include the word Endpoint instead of Warehouse. Besides the name, these events are identical to the SQL warehouse events. To view descriptions and request parameters of these events, see their corresponding warehouse events in Databricks SQL events.

The SQL endpoint events are:

  • changeEndpointAcls
  • createEndpoint
  • editEndpoint
  • startEndpoint
  • stopEndpoint
  • deleteEndpoint
  • setEndpointConfig
On this page