Audit Events

Page last updated:


Audit events help Cloud Foundry operators monitor actions taken against resources (such as apps) via user or system actions.

Differences from Other Types of Events

Despite being similar in name, audit events are different from Cloud Foundry usage events. Unlike usage events, audit events are not suitable for app and service billing.

Another tool to help administrators monitor user actions on Cloud Foundry is Security event logging. Unlike Security Event Logs, audit events do not cover all API endpoints, but provide more details about a user’s actions.

View Events

The easiest way to view events for an app is to use the Cloud Foundry CLI:

cf events APP_NAME

This results in the following output:

time                          event                      actor   description
2018-09-04T17:03:49.00-0700   admin
2018-09-04T17:03:28.00-0700           admin   state: STARTED
2018-09-04T17:03:27.00-0700     admin
2018-09-04T17:03:24.00-0700      admin
2018-09-04T17:03:24.00-0700        admin
2018-09-04T17:03:24.00-0700           admin   instances: 1, state: STOPPED, environment_json: [PRIVATE DATA HIDDEN]

This command shows the 50 most recent events for that app. To see more events, or events that are not attributed to an app, use the following Cloud Foundry API endpoint:

GET /v3/audit_events

$ cf curl /v3/audit_events
  "pagination": {
    "total_results": 1,
    "total_pages": 1,
    "first": {
      "href": ""
    "last": {
      "href": ""
    "next": null,
    "previous": null
  "resources": [
      "guid": "a595fe2f-01ff-4965-a50c-290258ab8582",
      "created_at": "2016-06-08T16:41:23Z",
      "updated_at": "2016-06-08T16:41:26Z",
      "type": "",
      "actor": {
        "guid": "d144abe3-3d7b-40d4-b63f-2584798d3ee5",
        "type": "user",
        "name": "admin"
      "target": {
        "guid": "2e3151ba-9a63-4345-9c5b-6d8c238f4e55",
        "type": "app",
        "name": "my-app"
      "data": {
        "request": {
          "recursive": true
      "space": {
        "guid": "cb97dd25-d4f7-4185-9e6f-ad6e585c207c"
      "organization": {
        "guid": "d9be96f5-ea8f-4549-923f-bec882e32e3c"
      "links": {
        "self": {
          "href": ""

For documentation about using this endpoint, see the API documentation.

Note get-events is a community-contributed cf CLI plug-in. The plug-in provides convenient flags to list events that took place today, from yesterday, or from a particular date. get-events also provides useful output formatting options. For more information, see get-events in cf CLI Plugins.

Using audit events

The following describes some of the intended use cases of audit events.

Resource history

Audit events allow users, administrators, and operators a view a resource’s history. For example, by looking at usage events for an app, an operator can see information such as when it was last updated or if it has crashed recently.

Querying for events

You can query the events endpoint with various filters. For example, you can query for all events of a given type, or all events associated with a resource since a given timestamp.

For a list of allowed filters, see List audit events in the API documentation.

The following example shows a query with multiple filters. The request gets events from a particular time period.

$ cf curl '/v3/audit_events?[gt]=2021-11-10T01:08:24Z&created_ats[lt]=2021-11-15T01:08:24Z&order_by=created_at'

External auditing warehouse

For auditing and compliance reasons, some operators may wish to keep a record of all audit events that have occurred. Because audit events expire and may be purged during a deploy, these operators must maintain an external data warehouse. This way they can store and access events across expiration events and conform to their own compliance requirements.

Types of audit events

App lifecycle (*)


Organization lifecycle (audit.organization.*)

  • audit.organization.create
  • audit.organization.delete-request
  • audit.organization.update

Route lifecycle (audit.route.*)

  • audit.route.create
  • audit.route.delete-request
  • audit.route.update
  • audit.route.share
  • audit.route.unshare
  • audit.route.transfer-owner

Service lifecycle (audit.service.*)

  • audit.service.create
  • audit.service.delete
  • audit.service.update

Service binding lifecycle (audit.service_binding.*)

  • audit.service_binding.create
  • audit.service_binding.delete
  • audit.service_binding.start_create
  • audit.service_binding.start_delete
  • audit.service_binding.update

Service broker lifecycle (audit.service_broker.*)

  • audit.service_broker.create
  • audit.service_broker.delete
  • audit.service_broker.update

Service dashboard client lifecycle (audit.service_dashboard_client.*)

  • audit.service_dashboard_client.create
  • audit.service_dashboard_client.delete

Service instance lifecycle (audit.service_instance.*)

  • audit.service_instance.bind_route
  • audit.service_instance.create
  • audit.service_instance.delete
  • audit.service_instance.share
  • audit.service_instance.unbind_route
  • audit.service_instance.unshare
  • audit.service_instance.update
  • audit.service_instance.start_create
  • audit.service_instance.start_update
  • audit.service_instance.start_delete
  • audit.service_instance.purge

Service route lifecycle (audit.service_route_binding.*)

  • audit.service_route_binding.create
  • audit.service_route_binding.delete
  • audit.service_route_binding.start_create
  • audit.service_route_binding.start_delete
  • audit.service_route_binding.update

Service key lifecycle (audit.service_key.*)

  • audit.service_key.create
  • audit.service_key.delete
  • audit.service_key.start_create
  • audit.service_key.start_delete
  • audit.service_key.update

Service plan visibility lifecycle (audit.service_plan_visibility.*)

  • audit.service_plan.create
  • audit.service_plan.update
  • audit.service_plan.delete
  • audit.service_plan_visibility.create
  • audit.service_plan_visibility.delete
  • audit.service_plan_visibility.update

Space lifecycle (*)


User lifecycle (audit.user.*)

  • audit.user.organization_auditor_add
  • audit.user.organization_auditor_remove
  • audit.user.organization_billing_manager_add
  • audit.user.organization_billing_manager_remove
  • audit.user.organization_manager_add
  • audit.user.organization_manager_remove
  • audit.user.organization_user_add
  • audit.user.organization_user_remove
  • audit.user.space_auditor_add
  • audit.user.space_auditor_remove
  • audit.user.space_supporter_add
  • audit.user.space_supporter_remove
  • audit.user.space_developer_add
  • audit.user.space_developer_remove
  • audit.user.space_manager_add
  • audit.user.space_manager_remove

User-provided service instance lifecycle (audit.user_provided_service_instance.*)

  • audit.user_provided_service_instance.create
  • audit.user_provided_service_instance.delete
  • audit.user_provided_service_instance.update

Special events

  • blob.remove_orphan

When are events created?

Most events are created when a user acts upon a resource. For example, a user issuing a cf stop APP_NAME command causes an event to be created and associated with that user.

  • Service events (audit.service*) are created after the service broker has approved an interaction.

  • Crash and rescheduling events (,|rescheduling) are created when Diego marks an app instance as crashed or evacuates app instances from cells on Diego Cell VM restarts.

  • Blob events (blob.remove_orphan) are created by a daily clean up job and do not represent user action.


Audit events can be created at any point during the execution of the action they describe. This means the action associated with the event is not guaranteed to have succeeded.

The audit events table can grow to be very large. So, for performance considerations, certain database migrations may result in the truncation of this table. In other words, this means that a deployment with such a migration will result in a loss of events.

These migrations are exceedingly rare and any release of capi-release that includes one will note this behavior prominently in its release notes.

The order of audit events returned from the API may not match the sequence of events that occurred in the system.

Do not rely on timestamps to sequence events; they may come from different Cloud Controller instances whose times could be slightly mismatched.

Audit events expire after 31 days by default. This is configurable using the capi-release manifest property cc.audit_events.cutoff_age_in_days.

View the source for this page in GitHub