Audit Logs

Overview

Audit logs allow you to keep track of who is using Sifflet within your organization, what they are doing on the platform, and when they did so. Audit logs ensure your organisation is able to comply with data governance regulations, enable faster troubleshooting by keeping a record of platform events, and foster trust by making operations transparent.

Prerequisites

  • Have Sifflet data sharing enabled on your Snowflake or s3

Navigate Audit Logs

Audit logs can be found in the AUDIT_LOG table of your data sharing.

Audit logs contain the following fields:

Field NameTypeDescription
IDstringThe log event ID
CREATED_ATtimestampThe date and time the audit log event was saved to the database.
EVENT_TIMESTAMPtimestampThe date and time the audit log event occurred.
AUTHENTICATION_TYPEstringThe authentication type of the principal that performed the event.
AUTHENTICATION_NAMEstringThe authenticated principal name. Can refer to the login or the token name.
ACTIONstringIndicates the action taken by the principal.
CLIENT_IPstringThe client IP of the principal who executed the action.
RESOURCEstringThe category of the resource on which the principal performed the action.
CONTENTstringThe event payload varies based on the action and the resource.

Events

Audit Logs Availability

Audit logs are made available in your data sharing with approx. 24-hour delay.