Skip to Content

Audit Log

The Audit Log records actions performed by users and the system across your CloudQuery Platform installation. Use it to track who did what, when, and from where β€” for security reviews, compliance requirements, and troubleshooting.

Accessing the audit log

  1. In the sidebar, click your user icon and select Admin Settings.
  2. Navigate to the Audit Log section.

What is logged

Each audit log entry includes:

FieldDescription
UserThe user who performed the action
IP addressThe IP address the action originated from
TeamThe team associated with the event (if applicable)
Event typeThe type of action performed (e.g., user login, sync created, policy updated)
EntityThe specific resource or object that was affected
StatusWhether the action succeeded or failed
TimestampWhen the event occurred
DetailsAdditional context about the event

Filtering and searching

Use the search bar and filters to narrow down audit log entries:

  • Search β€” full-text search across user name, team name, event type, entity name, and IP address
  • User β€” filter by a specific user
  • Team β€” filter by team name
  • Event type β€” filter by the type of action
  • Entity β€” filter by the affected resource name
  • IP address β€” filter by source IP
  • Time range β€” filter by start and end time

Use cases

  • Security investigation β€” identify who modified a sync configuration or changed user permissions
  • Compliance β€” demonstrate access controls and change tracking for auditors
  • Troubleshooting β€” correlate user actions with system behavior to diagnose issues
  • Access review β€” verify that API keys and user accounts are being used as expected
Last updated on