Audit Logs
Overview
Audit logs allow you to keep track of who is using Sifflet within your organization, what they are doing on the platform, and when they did so. Audit logs ensure your organisation is able to comply with data governance regulations, enable faster troubleshooting by keeping a record of platform events, and foster trust by making operations transparent.
Prerequisites
- Have Sifflet data sharing enabled on your Snowflake or s3
Navigate Audit Logs
Audit logs can be found in the AUDIT_LOG
table of your data sharing.
Audit logs contain the following fields:
Field Name | Type | Description |
---|---|---|
ID | string | The log event ID |
CREATED_AT | timestamp | The date and time the audit log event was saved to the database. |
EVENT_TIMESTAMP | timestamp | The date and time the audit log event occurred. |
AUTHENTICATION_TYPE | string | The authentication type of the principal that performed the event. |
AUTHENTICATION_NAME | string | The authenticated principal name. Can refer to the login or the token name. |
ACTION | string | Indicates the action taken by the principal. |
CLIENT_IP | string | The client IP of the principal who executed the action. |
RESOURCE | string | The category of the resource on which the principal performed the action. |
CONTENT | string | The event payload varies based on the action and the resource. |
Audit Logs Availability
Audit logs are made available in your data sharing with approx. 24-hour delay.
Updated 17 days ago