Audit Logs
Overview of Netmaker’s Audit Logs for tracking actions and changes
OverviewCopied!
Netmaker v0.99.0 introduces Audit Logs, a critical feature designed to enhance system transparency, traceability, and security. This feature records significant system events and user actions, providing administrators with clear visibility into changes within their network infrastructure.
PurposeCopied!
Audit Logs are essential for:
-
Tracking Configuration Changes: Monitor who changed what and when.
-
Enhancing Security: Detect unauthorized or unexpected operations.
-
Compliance: Assist in meeting organizational and regulatory audit requirements.
-
Troubleshooting: Reconstruct event sequences to identify and resolve issues efficiently.
What’s Covered?
The audit log currently tracks actions on all important Netmaker resources:
Subject |
Description |
Status |
---|---|---|
Users |
User-related operations (create, update, delete) |
✅ Covered |
UserAccessToken |
API tokens issued, revoked |
✅ Covered |
Nodes |
Node creation, modification, deletion |
✅ Covered |
Settings |
Platform settings changes |
✅ Covered |
ACLs |
ACL (Access Control List) changes |
✅ Covered |
Tags |
Tag creation, modification, deletion |
✅ Covered |
User Roles |
User role assignments |
✅ Covered |
User Groups |
User groups creation, changes, removal |
✅ Covered |
User Invites |
User invites sent, revoked |
✅ Covered |
Pending Users |
Pending user management (invites, approvals) |
✅ Covered |
Egress |
Egress gateway creation, changes, and removal. |
✅ Covered |
Network |
Network creation, configuration updates, deletion |
✅ Covered |
Enrollment Keys |
Enrolment key creation, updates, and removal |
✅ Covered |
Desktop App Activity |
User connect/disconnect actions on the desktop client |
✅ Covered |