Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt

Use this file to discover all available pages before exploring further.

Audit logging for CoreWeave AI Object Storage provides granular records of actions performed on your object storage resources. Logs are written to a reserved bucket named cw-[ORG-ID]-audit-logs in your organization. Audit logging can be used for the following purposes:
  • Security and compliance teams: trace data access and administrative actions
  • Platform and storage admins: understand access patterns and debug incidents
  • Application engineers: correlate storage audit logs with application logs to investigate behavior during incidents
Limited availabilityAudit logging is currently in limited availability. To request access, contact our Support team.

Log types

Audit logging captures two types of events: control plane events and data plane events.

Control plane logs

Control plane logs capture administrative and configuration-level events, including:
  • Key creation
  • Key revocation
  • Audit logging enabled for a bucket or for the organization
  • Audit logging disabled
Each control plane log entry includes the following fields (not exhaustive):
FieldDescription
actionThe action that was performed
principalThe identity that performed the action
principalRoleThe role associated with the principal
timestampWhen the action occurred
identifierThe access key ID or bucket name, depending on the event
duration_secondsDuration of the action in seconds
Control plane logs are stored under a control-plane/ prefix in your organization’s audit logging bucket, partitioned by date and time.

Data plane logs

Data plane logs capture authenticated access to data, including:
  • Object operations such as puts, gets, and deletes
  • Bucket operations such as bucket creation and listings
Each data plane log entry includes the following fields (not exhaustive):
FieldDescription
actionThe operation performed
aws:arnThe resource ARN; for object operations, includes the object key path
principalThe identity ARN of the principal that performed the operation
timestampWhen the operation occurred
sourceIpThe source IP address of the request
hostThe HTTP Host header of the request
bucketNameThe name of the bucket
accessKeyIdThe access key ID used
requestIdA correlation handle for logs and request traces
Data plane logs are stored under a data-plane/ prefix in your organization’s audit logging bucket, partitioned by date and time.

Log format and delivery

Logs are batched and compressed before being written to the audit logging bucket. Events are written to a durable message queue and bundled at least every 15 minutes before being persisted. The on-disk format is line-delimited JSON, where each line is a JSON object, stored in compressed files (.json or .json.gz). Object keys follow this format:
Log typeObject key format
Control planecontrol-plane/YYYY/MM/DD/HHMM+<ID>.<FileFormat>
Data planedata-plane/YYYY/MM/DD/HHMM+<ID>.<FileFormat>
Keep the following in mind when processing audit logs:
  • The order of events inside a bundle is not guaranteed to match the order in which they were generated.
  • The order of bundles written to the audit logging bucket does not reflect the precise generation order.
  • A single request (for example, a multi-object delete) can generate multiple log entries.

Audit logging bucket

Each organization has one audit logging bucket, named cw-[ORG-ID]-audit-logs, where [ORG-ID] is your organization ID. The bucket is isolated per organization and governed by your organization access policies and bucket access policies. You are responsible for managing the data in the bucket and pay storage fees for that data. For billing details, see Usage-based billing and pricing.

Configuration

Audit logging can be configured at the organization level or at the individual bucket level.
ScopeWhat it controlsAPI endpoint
OrganizationControl plane events; data plane events for buckets created after the setting is enabledSetOrganizationSettings
BucketData plane events for a specific bucketSetBucketSettings
Control plane logging can only be enabled at the organization level. It cannot be scoped to individual buckets. When you enable data plane logging at the organization level, it applies only to new buckets created after the setting is enabled. Buckets that already exist keep their prior data plane logging state until you enable data plane logging for each bucket. Because high-traffic buckets can produce large volumes of log data, per-bucket logging is more targeted and can help avoid unexpected storage fees.

Enable audit logging

Enabling audit logging requires steps from both CoreWeave and your team. CoreWeave provisions your destination bucket and enables the feature on the backend; you configure the bucket access policy and logging settings.

Prerequisites

Enabling audit logging requires two separate permissions:

Steps

  1. Contact CoreWeave support to request enablement and include:
    • Your organization name and Org ID. Your Org ID is a short hexadecimal string (for example, ab1cd2). Find it on the Settings page of your Cloud Console account.
    CoreWeave will create your cw-[ORG-ID]-audit-logs destination bucket as part of the enablement process.
  2. After CoreWeave creates the destination bucket, apply a bucket access policy granting the CoreWeave audit logging service account permission to write logs. The policy must grant at minimum s3:ListBucket and s3:PutObject. Replace [ORG-ID] with your organization ID.
    audit-logging-bucket-access-policy.json
    {
      "Statement": [
        {
          "Sid": "AllowAuditLoggingServiceAccount",
          "Action": [
            "s3:ListBucket",
            "s3:PutObject"
          ],
          "Effect": "Allow",
          "Principal": {
            "CW": [
              "arn:aws:iam::coreweave:static/audit-logs"
            ]
          },
          "Resource": [
            "arn:aws:s3:::cw-[ORG-ID]-audit-logs",
            "arn:aws:s3:::cw-[ORG-ID]-audit-logs/*"
          ]
        }
      ],
      "Version": "2012-10-17"
    }
    
    For instructions on applying this policy using S3 clients or Terraform, see Manage bucket access policies.
  3. Notify CoreWeave that the bucket access policy has been applied, either by replying to your CoreWeave support ticket or by notifying CoreWeave through your support Slack channel. The CoreWeave admin will finish enabling audit logging for your organization.
  4. Call the Object Storage API to enable the types of logs you want:
    • Use organization-level settings to enable control plane logging, data plane logging for all buckets created after the setting is enabled, or both.
    • Use bucket-level settings to enable data plane logging for a specific bucket only.
    Organization-level settings let you enable control plane logging, data plane logging for all buckets created after the setting is enabled, or both.Set the flags to true or false based on which event types you want to log:
    • controlPlaneAuditLoggingEnabled: Control plane logging
    • bucketAuditLoggingEnabled: Data plane logging for buckets created after the setting is enabled
    Save the following as organization-settings.json:
    organization-settings.json
    {
      "settings": {
        "controlPlaneAuditLoggingEnabled": true,
        "bucketAuditLoggingEnabled": true
      }
    }
    
    Submit the request:
    Example request
    curl -X PUT https://api.coreweave.com/v1/cwobject/organization/settings \
      -H "Content-Type: application/json" \
      -H "Authorization: Bearer [API-ACCESS-TOKEN]" \
      -d @organization-settings.json
    
    A successful response returns the updated organization settings:
    Response status code 200
    {
      "settings": {
        "controlPlaneAuditLoggingEnabled": true,
        "bucketAuditLoggingEnabled": true
      }
    }
    
Last modified on April 28, 2026