Scheduler audit logs in AWS PCS
Scheduler audit logs record Remote Procedure Call (RPC) operations processed by
your cluster's Slurm controller (slurmctld) and database daemon
(slurmdbd). The AUDIT_RPCS: prefix in the log message
identifies these logs. They support security auditing and compliance use cases.
For clusters running Slurm 25.11 and later, AWS PCS delivers audit logs separately
through the PCS_SCHEDULER_AUDIT_LOGS log type. This separation lets you
control audit log ingestion and storage costs independently from your operational logs,
because audit logs can make up to 90% of scheduler log volume.
Note
For clusters running Slurm versions earlier than 25.11, audit logs remain in
PCS_SCHEDULER_LOGS and the PCS_SCHEDULER_AUDIT_LOGS log
type is not available. For more information about scheduler logs, see
Scheduler logs in AWS PCS.
Contents
Prerequisites
Before you can set up scheduler audit logs, you must meet the following requirements:
-
Your cluster must be running Slurm 25.11 or later.
-
The IAM principal that manages the AWS PCS cluster must allow the
pcs:AllowVendedLogDeliveryForResourceaction.
The following example IAM policy grants the required permissions.
Set up scheduler audit logs
You can set up scheduler audit logs for your AWS PCS cluster with the AWS Management Console or AWS CLI. Scheduler audit logs are opt-in. AWS PCS does not deliver them until you subscribe.
Scheduler audit log stream paths and names
The path and name for AWS PCS scheduler audit logs depend on the destination type.
-
CloudWatch Logs
-
A CloudWatch Logs stream follows this naming convention.
AWSLogs/PCS/${cluster_id}/${log_name}_${scheduler_major_version}_audit.logWhere
${log_name}isslurmctldorslurmdbd.Example
AWSLogs/PCS/abcdef0123/slurmctld_25.11_audit.log AWSLogs/PCS/abcdef0123/slurmdbd_25.11_audit.log
-
-
S3 bucket
-
An S3 bucket output path follows this naming convention:
AWSLogs/${account-id}/PCS/${region}/${cluster_id}/scheduler_audit/${log_name}/yyyy/MM/dd/HH/Example
AWSLogs/111111111111/PCS/us-east-2/abcdef0123/scheduler_audit/slurmctld/2026/03/01/00/ AWSLogs/111111111111/PCS/us-east-2/abcdef0123/scheduler_audit/slurmdbd/2026/03/01/00/
-
Example scheduler audit log record
AWS PCS scheduler audit logs are structured. They use the same schema as scheduler
logs, with the log message containing the AUDIT_RPCS: prefix. Here is
an example from slurmctld.
{
"resource_id": "pcs_bu93qsds2j",
"resource_type": "PCS_CLUSTER",
"event_timestamp": 1774481175953,
"log_level": "info",
"log_name": "slurmctld",
"scheduler_type": "slurm",
"scheduler_major_version": "25.11",
"scheduler_patch_version": "2",
"node_type": "controller_primary",
"message": "[2026-01-21T08:19:26.692+00:00] AUDIT_RPCS: [slurmctld-primary:6817(fd:18)] msg_type=REQUEST_PARTITION_INFO uid=0 client=[10.0.76.95:56918]\n"
}
Here is an example from slurmdbd.
{
"resource_id": "pcs_bu93qsds2j",
"resource_type": "PCS_CLUSTER",
"event_timestamp": 1774485082772,
"log_level": "info",
"log_name": "slurmdbd",
"scheduler_type": "slurm",
"scheduler_major_version": "25.11",
"scheduler_patch_version": "2",
"node_type": "slurmdbd_primary",
"message": "[2026-01-21T08:19:26.692+00:00] AUDIT_RPCS: msg_type=DBD_GET_CLUSTERS uid=0 client=[28.5.0.18:36658] protocol=11008\n"
}
Audit log behavior by Slurm version
The following table describes how audit logs are delivered depending on the Slurm version running on your cluster.
| Slurm version | PCS_SCHEDULER_LOGS contains |
PCS_SCHEDULER_AUDIT_LOGS available |
|---|---|---|
| Earlier than 25.11 | All logs, including audit logs | No |
| 25.11 and later | Operational logs only (audit logs removed) | Yes (opt-in) |