Audit Log
The Audit Log records actions performed by users and the system across your CloudQuery Platform installation. Use it to track who did what, when, and from where β for security reviews, compliance requirements, and troubleshooting.
Accessing the audit log
- In the sidebar, click your user icon and select Admin Settings.
- Navigate to the Audit Log section.
What is logged
Each audit log entry includes:
| Field | Description |
|---|---|
| User | The user who performed the action |
| IP address | The IP address the action originated from |
| Team | The team associated with the event (if applicable) |
| Event type | The type of action performed (e.g., user login, sync created, policy updated) |
| Entity | The specific resource or object that was affected |
| Status | Whether the action succeeded or failed |
| Timestamp | When the event occurred |
| Details | Additional context about the event |
Filtering and searching
Use the search bar and filters to narrow down audit log entries:
- Search β full-text search across user name, team name, event type, entity name, and IP address
- User β filter by a specific user
- Team β filter by team name
- Event type β filter by the type of action
- Entity β filter by the affected resource name
- IP address β filter by source IP
- Time range β filter by start and end time
Use cases
- Security investigation β identify who modified a sync configuration or changed user permissions
- Compliance β demonstrate access controls and change tracking for auditors
- Troubleshooting β correlate user actions with system behavior to diagnose issues
- Access review β verify that API keys and user accounts are being used as expected
Last updated on