Skip to main content

Logs

Logs

The Logs section provides administrators with comprehensive visibility into platform activity and user actions, serving as an audit trail for security, debugging, and compliance purposes.

This logging system integrates with user management, role management, authentication systems, and process monitoring to provide complete platform oversight.

Overview

The logs interface displays all platform activities in a structured table format, allowing administrators to track user behavior, system events, and operational changes across the platform.

User Management

Log Entry Structure

Each log entry contains the following information:

  • User: Email address of the user who performed the action
  • Action: Type of operation executed (e.g., USER_AUTH, ADD_USERS_TO_GROUP, UPDATE_INSTANCE)
  • Details: Brief description or category of the action
  • CreatedAt: Timestamp when the action was executed
  • ObjectInfo: JSON object containing structured data and metadata related to the action
  • Open: Interactive button to view detailed information or navigate to related resources

Filtering Capabilities

The logs interface provides multiple filtering options to help you find specific activities:

Basic Filters

  • User Filter: Search for logs by user email address with autocomplete functionality
  • Action Filter: Filter by specific action types or keywords

Advanced Filters

Click "More Filters" to access additional filtering options:

  • Details Filter: Search within action details and descriptions
  • Date Range: Filter logs by creation date using a date picker with start and end dates
User Management

Filter Management

  • Use the X button to clear all filters and return to the complete log view
  • Filters are applied in real-time as you type or make selections
  • Combine multiple filters for precise log searches

Interactive Features

View Action Details

Each log entry includes a "View" button that provides context-aware navigation:

Pagination

  • Navigate through large log datasets using the pagination controls
  • Configurable items per page (default: 10 entries)
  • Real-time page count updates based on filtered results

Common Use Cases

Security Auditing

Monitor security-related activities:

System Debugging

Investigate system issues and performance:

Compliance Reporting

Generate reports for regulatory and business requirements:

  • User Activity Reports: Generate activity reports for specific users or time periods
  • Change Documentation: Document system changes for regulatory requirements
  • Audit Trails: Maintain comprehensive audit trails for data governance
  • Access Reviews: Review access patterns for compliance audits

Log Categories and Actions

User Management Actions

Track user-related activities:

  • USER_AUTH: User authentication and login events
  • CREATE_USER: New user account creation
  • UPDATE_USER: User profile modifications
  • DELETE_USER: User account deletions
  • BLOCK_USER / UNBLOCK_USER: User account status changes

Role and Permission Actions

Monitor access control changes:

  • ADD_USERS_TO_GROUP: User assignments to roles or groups
  • REMOVE_USERS_FROM_GROUP: User removals from roles or groups
  • CREATE_ROLE: New role creation
  • UPDATE_ROLE: Role modifications
  • DELETE_ROLE: Role deletions

Process and Instance Actions

Track workflow execution and management:

  • START_PROCESS: Process instance initiation
  • UPDATE_INSTANCE: Process instance modifications
  • END_INSTANCE: Process completion or termination
  • VALIDATE_TASK: Task completion and validation
  • UPDATE_TASK: Task modifications

System Configuration Actions

Monitor platform configuration changes:

Tips for Effective Log Management

Search Strategies

Optimize your log searches:

  1. Use Date Filters: Narrow down searches to specific time periods for faster results
  2. Combine Filters: Use multiple filter criteria to find exact log entries
  3. Action-Specific Searches: Use action filters to focus on specific types of operations
  4. User-Focused Analysis: Filter by specific users to track individual activity patterns

Regular Monitoring

Establish monitoring routines:

  1. Daily Reviews: Check logs regularly for unusual activity patterns
  2. Weekly Summaries: Generate weekly activity summaries for trend analysis
  3. Monthly Audits: Perform monthly comprehensive audits for compliance
  4. Alert Integration: Use with instances monitoring for automated alerting

Performance Considerations

Optimize log management for large datasets:

  1. Date Range Limits: Use appropriate date ranges to limit result sets
  2. Specific Filters: Apply specific filters before broad searches
  3. Export Capabilities: Export filtered results for offline analysis
  4. Archive Strategy: Implement log archiving for long-term retention

Navigation Path: Monitoring → Logs


Log Integration & Analysis

Development Integration

Logs provide insights for development activities:

Administration Integration

Logs support comprehensive platform administration:

Compliance & Security

Use logs for security and compliance requirements:

  1. Regulatory Compliance: Meet audit requirements with comprehensive activity tracking
  2. Security Monitoring: Identify potential security threats and unusual access patterns
  3. Change Management: Document all system changes for governance purposes
  4. Access Reviews: Regular review of user access and activity patterns

Next Steps

Continue building your monitoring and security infrastructure:

Enhanced Monitoring:

Security & Administration:

Development Optimization: