Skip to main content

Audit Logs

The audit log records every significant action in Stratora — who did what, when, and from where. It provides a tamper-evident trail for security reviews, compliance audits, and operational troubleshooting.


What Gets Logged

Every user-initiated and system action that creates, modifies, or deletes a resource is recorded. Each log entry captures:

FieldDescription
TimestampWhen the action occurred (server time)
UserWho performed the action (username preserved even if the account is later deleted)
ActionWhat was done (create, update, delete, login, reveal, etc.)
Resource TypeWhat kind of object was affected (node, user, credential, etc.)
Resource NameDisplay name of the affected object
DetailsAdditional context as structured data (e.g., old/new values, method used)
IP AddressClient IP of the request
User AgentBrowser or API client identifier

Tracked Events

Authentication

EventDetails Logged
Successful loginUsername, authentication method (local, LDAP, OIDC)
Failed loginUsername attempted, failure reason (invalid credentials, inactive account)
LogoutSession ended

User Management

EventDetails Logged
User createdUsername, role assigned
User updatedFields changed (role, email, display name)
User enabled / disabledAccount status change
User permanently deletedUsername (preserved for traceability)
Password resetWhich user was reset (by an admin)

Infrastructure

EventDetails Logged
Node created / updated / deletedNode name, changes made
Node approved / rejectedEnrollment decision for agent-registered nodes
Nodes bulk-assignedTarget site, node count
Site created / updated / deletedSite name
Node group changesGroup name, membership changes
Discovery job runTarget subnet/site

Credentials

EventDetails Logged
Credential created / updated / deletedCredential name and type (never the secret value)
Credential revealedWho viewed the plaintext secret and the stated reason
Credential attached / detachedWhich node, which purpose
Credential enabled / disabledState change
Credential re-encryptedKey rotation event
warning

Credential secret values are never written to the audit log. Only the fact that a reveal or decryption occurred is recorded, along with who performed it.

Alerting & Maintenance

EventDetails Logged
Alert acknowledgedWho acknowledged, comment if provided
Alert muted / unmutedDuration, reason
Alert configuration created / updated / deletedRule name, thresholds
Alert configuration enabled / disabledState change
Escalation team changesTeam name
Maintenance window created / endedScope, schedule

Dashboards & Maps

EventDetails Logged
Dashboard created / updated / deletedDashboard name
Topology map created / updated / deletedMap name

System

EventDetails Logged
Enrollment token created / revealedToken description (never the token value)
Collector / agent revokedComponent name
License uploaded / removedEdition, node limit, expiration
Data retention policy changedPrevious and new retention period, compliance preset
Data purge triggeredCompaction requested
Settings changedWhich setting, old and new value

Viewing Audit Logs

Navigate to Administration → Audit Logs to view the log. The interface supports:

Filtering

FilterDescription
Time rangeStart and end timestamps
UserFilter by specific user
ActionFilter by action type (create, update, delete, login, reveal, etc.)
Resource typeFilter by object type (node, user, credential, etc.)
SearchFull-text search across username, resource name, action, IP address, and details

Statistics

The audit log dashboard shows:

  • Total log entries
  • Action breakdown for the last 24 hours (how many creates, updates, logins, etc.)
  • Resource type breakdown for the last 24 hours (which resource types were most active)

Resource History

You can also view the audit trail for a specific resource — for example, all changes ever made to a particular node or credential. This is accessible from the resource's detail view.


Retention

Audit log entries are stored in the database indefinitely by default. Administrators can configure automatic cleanup to remove entries older than a specified number of days.

tip

For compliance purposes, consider your regulatory requirements before shortening audit log retention. Standards like HIPAA, SOX, and PCI DSS have specific requirements for how long audit trails must be preserved.


Compliance Use Cases

The audit log supports common compliance and security requirements:

  • Change tracking — prove who made configuration changes and when
  • Access accountability — trace login activity across local, LDAP, and SSO authentication
  • Credential governance — demonstrate that secret access is controlled and audited
  • Incident investigation — correlate alert acknowledgments and maintenance windows with user actions
  • Separation of duties — verify that role-appropriate users performed sensitive actions
  • License compliance — track license uploads and edition changes