Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

The GENERAL INFORMATION > LOGS page displays the audit log and host log for the chosen host. From the Logs drop-down menu, choose Audit Logs or Host Logs, and then click Display Recent to view the latest log events.

Audit Logs

The Audit Logs page shows the following information for each event:

  • Timestamp: The UTC timestamp of the task performed by the user

  • User: The name of the user account from which the task was performed

  • Source IP: The IP address of the source that initiated the task

  • Resource Type: The resource with which the performed task was associated

  • Action: The action performed by a user
    For example, this field would display Update if a user updated the host’s configuration or Delete if a user deleted tags on a host.

  • Event Summary: Information about the action taken for the event
    Click View Metadata to view the following additional information for a specific event:

    • Session Type: The type of authentication used for the event’s session
      For example, this can be bearer (which is session-based) or token (which is token-based).

    • Subject Role: The role of the subject who generated this event

    • Session ID: The audit session ID associated with this login session

    • App Identifier: The application source associated with the audit session

    • Full Request URI: The full URI of the API request sent for this event

    • API Request ID: The API request ID of the audit event

    • Resource ID: The ID of the resource type

    • HTTP Verb: The operation performed on the event
      The most commonly used operations are POST, GET, PUT, PATCH, and DELETE.

    • HTTP Response Code: The HTTP status code that indicates whether the HTTP request associated with this event has been completed successfully
      For example, 200 indicates the request completed successfully.

Host Logs

The Host Logs page shows the following information for each event:

  • Timestamp: The timestamp when the event was logged.

  • OPHID: The unique ID for the host on which the event was logged.

  • Message: The message describing the action of the event.

You can also click View Metadata to see the following information:

  • Container Name: The name of the software for the host environment.

You can also view host logs via the Administration > Logs page:

  • On the Cloud Services Portal, go to Administration > Logs > Service Logs.

  • Click Display Recent, and then filter the result by Hosts.

For more information, see Viewing Service Logs.

Downloading Logs

To download a CSV log, click Download. For audit logs, the downloaded file will be formatted as audit-log-the timestamp in UTC format.csv (example: audit-log-10-10-2022, 10-30-59 PM UTC.csv). For host logs, the downloaded file will be formatted as as HostLogs-the timestamp in UTC format.csv (example: HostLogs-4-15-2023, 12-44-27 AM IST.csv)

You can also do the following:

  • Click the Sort by menu, choose the column by which you want to sort the events, and then use the up and down arrows to sort the events in ascending or descending order.

  • In the text box Search, enter the value you want to search on.

  • Click Display Recent to see the most recent 100 events.

  • Click

to activate the filtering feature, and then click

(blue star)

to configure your filter.

From the Basic Columns menu, choose a filter you want to add. For example, if you choose Timestamp, then use the calendar feature to select a timeline for which you want to filter the results.

If necessary, perform one or more of the following functions:

To add another filter, click

  • again. When you are done, click

    .

  • To remove a filter, click

    .

    1. To save a filter for future use, click

      and enter the filter’s name.

    2. To find the saved filter, click

  • No labels