docs
Security
Audit Logs

Audit Logs

Audit Logs provide a comprehensive record of all user actions and API requests within your SkyU platform. This feature enables security monitoring, compliance tracking, and troubleshooting by capturing detailed information about who did what, when, and whether the action was authorized.

Audit logs are automatically updated every 6 hours. Recent activity may take up to 6 hours to appear in the logs.

Accessing Audit Logs

Navigate to Organization SettingsSecurityAudit Logs to view all recorded activities within your organization.

Understanding Audit Log Entries

Each audit log entry shows:

FieldDescription
TimestampExact date and time of the action
MethodType of request (GET, POST, PUT, PATCH, DELETE)
PathThe specific API endpoint that was accessed
ServiceWhich SkyU service handled the request
StatusWhether the action was Authorized or Unauthorized
UserThe user who performed the action

Viewing Detailed Information

Click on any log entry to expand it and view additional details:

FieldDescription
Trace IDUnique identifier for tracking the request
Organization & ProjectContext where the action occurred
Authorization DetailsInformation about the access control decision

Filtering Audit Logs

Basic Filters

FilterDescription
SearchEnter keywords to search across API paths and trace IDs
Date RangeSelect a specific time period using the date picker

Advanced Filters

Click Show Advanced Filters to access additional filtering options:

FilterOptions
MethodGET, POST, PUT, PATCH, DELETE
StatusAuthorized, Unauthorized
ServiceAuth Service, Resource Service, Cluster Service, Credential Service, File Service
UserSelect from the dropdown list of users in your organization

Use Cases

Security Monitoring

Track Unauthorized Access

  • Filter by Status: "Unauthorized" to see failed access attempts
  • Monitor for suspicious patterns or repeated failures
  • Identify potential security threats

Regularly review unauthorized access attempts to identify potential security issues early.

Monitor User Activity

  • Filter by specific users to review their actions
  • Verify compliance with access policies
  • Investigate unusual behavior

Compliance & Auditing

Generate Audit Reports

  • Use date range filters to export logs for specific time periods
  • Review all actions for compliance verification
  • Provide audit trails for regulatory requirements

Audit logs can help demonstrate compliance with GDPR, HIPAA, SOC 2, and other regulatory frameworks.

Track Data Access

  • Monitor who accessed sensitive resources
  • Demonstrate compliance with data protection regulations
  • Maintain records for external audits

Troubleshooting

Debug Issues

  • Use the Trace ID to track specific requests across services
  • Filter by Method and Path to find failed operations
  • Identify patterns in error occurrences

Analyze User Problems

  • Filter by user to see their recent activity
  • Identify where authorization failures occur
  • Help users resolve access issues

Best Practices

Regular Monitoring

  • Review audit logs periodically for unusual activity
  • Set up a routine to check for unauthorized access attempts
  • Monitor high-privilege user actions

Effective Filtering

  • Use date ranges to focus on recent activity
  • Combine multiple filters for precise results
  • Start with broad searches, then narrow down

Combine filters for better results. For example: specific user + date range + service to find exactly what you're looking for.