Audit Logs

Overview of Netmaker’s Audit Logs for tracking actions and changes

OverviewCopied!

Netmaker v0.99.0 introduces Audit Logs, a critical feature designed to enhance system transparency, traceability, and security. This feature records significant system events and user actions, providing administrators with clear visibility into changes within their network infrastructure.

PurposeCopied!

Audit Logs are essential for:

  • Tracking Configuration Changes: Monitor who changed what and when.

  • Enhancing Security: Detect unauthorized or unexpected operations.

  • Compliance: Assist in meeting organizational and regulatory audit requirements.

  • Troubleshooting: Reconstruct event sequences to identify and resolve issues efficiently.

What’s Covered?

The audit log currently tracks actions on all important Netmaker resources:

Subject

Description

Status

Users

User-related operations (create, update, delete)

✅ Covered

UserAccessToken

API tokens issued, revoked

✅ Covered

Nodes

Node creation, modification, deletion

✅ Covered

Settings

Platform settings changes

✅ Covered

ACLs

ACL (Access Control List) changes

✅ Covered

Tags

Tag creation, modification, deletion

✅ Covered

User Roles

User role assignments

✅ Covered

User Groups

User groups creation, changes, removal

✅ Covered

User Invites

User invites sent, revoked

✅ Covered

Pending Users

Pending user management (invites, approvals)

✅ Covered

Egress

Egress gateway creation, changes, and removal.

✅ Covered

Network

Network creation, configuration updates, deletion

✅ Covered

Enrollment Keys

Enrolment key creation, updates, and removal

✅ Covered

Desktop App Activity

User connect/disconnect actions on the desktop client

✅ Covered