Configure audit logs
This page describes how to configure audit logs in Pinecone. Audit logs provide a detailed record of user, service account, and API actions that occur within Pinecone. Pinecone supports Amazon S3 as a destination for audit logs.
To enable and manage audit logs, you must be an organization owner. This feature is in public preview and available only on Enterprise plans.
Enable audit logs
Before you can enable audit logs, you need to create an IAM policy and role in Amazon S3. To start, ensure you have the following:
- A Pinecone account.
- An Amazon S3 bucket.
1. Create an IAM policy
In the AWS IAM console:
- In the navigation pane, click Policies.
- Click Create policy.
- In Select a service section, select S3.
- Select the following actions to allow:
ListBucket
: Permission to list some or all of the objects in an S3 bucket.PutObject
: Permission to add an object to an S3 bucket.
- In the Resources section, select Specific.
- For the bucket, specify the ARN of the bucket you created. For example:
arn:aws:s3:::example-bucket-name
- For the object, specify an object ARN as the target resource. For example:
arn:aws:s3:::example-bucket-name/*
- Click Next.
- Specify the name of your policy. For example: “Pinecone-S3-Access”.
- Click Create policy.
2. Set up access using an IAM role
In the AWS IAM console:
-
In the navigation pane, click Roles.
-
Click Create role.
-
In the Trusted entity type section, select AWS account.
-
Select Another AWS account.
-
Enter the Pinecone AWS VPC account ID:
713131977538
-
Click Next.
-
Select the policy you created.
-
Click Next.
-
Specify the role name. For example: “Pinecone”.
-
Click Create role.
-
Click the role you created.
-
On the Summary page for the role, find the ARN.
For example:
arn:aws:iam::123456789012:role/PineconeAccess
-
Copy the ARN.
You will need to enter the ARN into Pinecone later.
3. Connect Pinecone to Amazon S3
- Go to Settings > Audit logs in the Pinecone console.
- Enter the Role ARN of the IAM role you created.
- Enter the name of the Amazon S3 bucket you created.
- Click Enable audit logging.
Once you enable audit logs, Pinecone will start writing logs to the S3 bucket. In your bucket, you will also see a file named audit-log-access-test
, which is a test file that Pinecone writes to verify that it has the necessary permissions to write logs to the bucket.
View audit logs
Logs are written to the S3 bucket approximately every 30 minutes. Each log batch will be saved into its own file as a JSON blob, keyed by the time of the log to be written. Only logs since the integration was created and enabled will be saved.
For more information about the log schema and captured events, see Security overview - Audit logs.
Edit audit log integration details
You can edit the details of the audit log integration in the Pinecone console:
- Go to Settings > Audit logs.
- Enter the new Role ARN or AWS Bucket.
- Click Update settings.
Disable audit logs
If you disable audit logs, logs not yet saved will be lost. You can disable audit logs in the Pinecone console:
- Go to Settings > Audit logs.
- Click the toggle next to Audit logs are active.
- Click Confirm.
Remove audit log integration
If you remove the audit log integration, logs not yet saved will be lost. You can remove the audit log integration in the Pinecone console:
- Go to Settings > Audit logs.
- At the top of the page, click the ellipsis (…) menu > Remove integration.
- Click Remove integration.
Was this page helpful?