Audit Log
  • 16 Aug 2024
  • 2 Minutes to read
  • Contributors
  • Dark
    Light
  • PDF

Audit Log

  • Dark
    Light
  • PDF

Article summary

The audit log is a record of evidence of key activities within an account. Each application identifies a list of key activities and creates a log when this activity occurs. The activity for audit logging is managed by the application and not by the user of the account.

The Audit Log page contains a grid that displays basic details, including the date and time the change was made, the event type, the overall impact of the change, tags applied to the change, and the user who created the change.

Each row in the grid is a separate audit log entry. If an arrow is visible in the row, it can be expanded to view the details of the change that was applied when the activity occurred. The details can be copied to the clipboard by clicking the Copy icon to the right of the change details.

The audit logs are grouped by namespaces. The available namespaces can change as each application adds new audit logs for certain user activities.

The list of audit logs in the grid can be filtered by the following criteria:

  • Namespace—a logical grouping of events where the change occurred. Select from the following:

    • admin-security—displays changes made to roles, user groups, and security profiles.

    • admin-user—displays changes made to users.

  • Created After—the date after which the change was made.

  • Created Before—the date before which the change was made.

  • Event Type—the type of change made. The list of event types changes based on the selected namespace. Select from the following:

    • Event Types for the admin-user namespace:

      • user_create—the creation of a user

      • user_change—the edit of user properties

      • user_delete—the deletion of a user

      • user_group_change—the edit of groups on a user

      • user_bulk_load—the bulk upload of users

    • Event Types for the admin-security namespace:

      • group_user_change—the edit of users assigned to a user group

      • group_role_change—the edit of roles assigned to a user group

      • group_create—the creation of a user group

      • group_change—the edit of user group properties, such as name or description

      • group_delete—the deletion of a user group

      • role_create—the creation of a role

      • role_change—the edit of role properties, such as name or description

      • role_delete—the deletion of a role

      • role_group_change—the edit of user groups assigned to a role

      • security_profile_create—the creation of a security profile

      • security_profile_change—the edit of security profile properties, such as name or description

      • security_profile_delete—the deletion of a security profile

      • security_profile_change_groups_roles—the edit of groups or roles assigned to a security profile

      • security_profile_change_managers—the edit of managers assigned to a security profile

  • Created By—the user who initiated the change

  • Tag— keyword or label assigned to each audit log to help categorize and organize the logs. Tags simplify searching for and retrieving information by allowing you to quickly filter and identify related entries based on the assigned labels. For example, you can search by the tag filter value “user” to display all audit logs in the namespace that contains this tag value. The Tags column shows tag values already assigned to each audit log. You can copy values from the column and filter audit logs. Filtering can be done with only one tag value at a time.


Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence