Skip to main content

Audit Logs


Audit Logs track what users do and any changes made to the system. It'll log everything that happens so we can make sure we're following rules and fix any problems that come up. This includes when someone tries to log in, when settings are changed, or when data is accessed. The goal is to have a clear record of all actions taken in the system. This helps us keep things safe and follow the standards. If there's ever an issue, we can look at these logs to figure out what happened and how to fix it. Overall, it's about keeping everything secure, following the rules, and making problem-solving easier for everyone using the system.


Audit Summary

The audit summary provides a concise summary of critical information. It includes details on the frequency of events, letting you know how often specific events occurred. The timestamp feature reveals the precise timing of each event, helping you understand the chronological order of activities. The responsible user or service information is also presented, giving insight into who or what initiated these events. To complete the picture, the dashboard highlights the impacted entity, indicating which system elements were affected by the recorded events. This comprehensive overview equips users with essential insights into the occurrence, timing, actors, and impact of events within the system.

On the audit summary page, you will be able to see the audit summary with the top 5 active users and most common failures details.

Search: Enter any keyword to search the audit logs. It will return all the matching records (from the Description column).

Show Logs for: You can select the date and time range for which you want to see the logs.

Edit Columns: Users can customize the view of the alert area by clicking on the 'Edit Column' option. This allows them to select or deselect specific columns to be displayed, such as target name, target ID, etc., tailoring the view to their preferences.

Timestamp: Records the exact time an event occurred, aiding in chronological analysis and understanding of activity timelines.

User: Identifies the individual or entity responsible for triggering the event, allowing for accountability and user-specific tracking.

Source IP: Shows the originating IP address, providing insights into the location or device from which the action originated.

Source: It indicates where the entry or record in the audit log originated from.

Action Identifier: The Action Identifier in audit logs functions as a brief description of a particular activity or event occurring within a system. It combines two essential elements: the "Object," representing the entity involved, and the "Action," signifying the specific operation performed.

Status: Indicates the state of events.

Resource Name and Type: Resource name identifies the name such as file name, or user name and Resource type indicates the category such as text file, or user account type.

Description: Provides a brief explanation or details about the event.