Skip to content

Commit 67c36a1

Browse files
authored
Add audit log (#55)
1 parent 129428c commit 67c36a1

File tree

4 files changed

+45
-5
lines changed

4 files changed

+45
-5
lines changed
Lines changed: 1 addition & 0 deletions
Loading

mint.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -220,9 +220,10 @@
220220
"group": "Organization",
221221
"pages": [
222222
"reference/settings",
223+
"reference/audit-log",
223224
"reference/field-restrictions",
224-
"reference/tokens",
225-
"reference/performance"
225+
"reference/performance",
226+
"reference/tokens"
226227
]
227228
},
228229
"reference/security"

reference/audit-log.mdx

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
---
2+
title: 'Track activity in Axiom'
3+
description: "This page explains how to track activity in your Axiom organization with the audit log."
4+
sidebarTitle: Audit Log
5+
tags:
6+
['audit los', 'track activity']
7+
---
8+
9+
The audit log allows you to track who did what and when within your Axiom organization.
10+
11+
Tracking activity in your Axiom organization with the audit log is useful for legal compliance reasons. For example, you can investigate the following:
12+
13+
- Track who has accessed the Axiom platform.
14+
- Track organization access over time.
15+
- Track data access over time.
16+
17+
The audit log also make it easier to manage your Axiom organization. They allow you to do the following, among others:
18+
19+
- Track changes made by your team to your observability posture.
20+
- Track monitoring performance.
21+
22+
The audit log is available to all users. Enterprise customers can query the audit log for the full time range. Other customers can query the audit log for the previous three days.
23+
24+
## Explore audit log
25+
26+
1. Go to the **Explore** tab, and then click **APL**.
27+
2. Query the `axiom-audit` dataset. For example, run the query `['axiom-audit']` to display the raw audit log data in a table.
28+
3. Optional: Customize your query to filter or summarize the audit log. For more information, see [Explore data](/query-data/explore).
29+
4. Click **Run**.
30+
31+
The `action` field specifies the type of activity that happened in your Axiom organization.
32+
33+
## Export audit log
34+
35+
1. Run the query to [display the audit log](#explore-audit-logs).
36+
2. Click <img src="/doc-assets/icons/ellipsis-vertical.svg" className="inline-icon" alt="More icon" /> **More > Download as JSON**.
37+
38+
## Restrict access to audit log
39+
40+
To restrict access to the audit log, use Axiom’s role-based access control to define who can access the `axiom-audit` dataset. For more information, see [Access](/reference/settings#access-overview).

reference/security.mdx

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,10 +58,8 @@ Axiom’s commitment to security extends beyond technological measures to includ
5858
Axiom supports secure, centralized user authentication through SAML-based SSO (Security Assertion Markup Language-based single sign-on). This makes it easy to keep access grants up-to-date with support for the industry standard SCIM protocol. Axiom supports both the flows initiated by the service provider and the identity provider (SP- and the IdP-initiated flows). This feature is available for Enterprise customers upon request.
5959

6060
If you’re on the Enterprise plan, Axiom enables you to take control over access to your data and features within Axiom through role-based permissions.
61-
{/*
62-
coming soon
61+
6362
Axiom provides you with searchable audit logs that provide you with comprehensive tracking of all activity in your Axiom organization to meet even the most stringent compliance requirements.
64-
*/}
6563

6664
## Sub-processors
6765

0 commit comments

Comments
 (0)