Audit Log Streams
Learn how to stream Infisical Audit Logs to external logging providers.
Audit log streams is a paid feature.
If you’re using Infisical Cloud, then it is available under the Enterprise Tier. If you’re self-hosting Infisical, then you should contact [email protected] to purchase an enterprise license to use it.
Infisical Audit Log Streaming enables you to transmit your organization’s Audit Logs to external logging providers for monitoring and analysis.
The logs are formatted in JSON, requiring your logging provider to support JSON-based log parsing.
Overview
Navigate to Organization Settings in your sidebar.
Select Audit Log Streams Tab.
Your Audit Logs are now ready to be streamed.
Example Providers
Better Stack
Select Connect Source
Provide a name and select platform
Provide Audit Log Stream inputs
- Copy the endpoint from Better Stack to the Endpoint URL field.
- Create a new header with key Authorization and set the value as Bearer <source token from betterstack>.
Datadog
Navigate to API Keys section
Select New Key and provide a key name
Find your Datadog region specific logging endpoint.
- Navigate to the Datadog Send Logs API documentation.
- Pick your Datadog account region.
- Obtain your Datadog logging endpoint URL.
Provide audit log stream inputs
- Copy the logging endpoint from Datadog to the Endpoint URL field.
- Copy the API Key from previous step
- Create a new header with key DD-API-KEY and set the value as API Key.
Audit Log Stream Data
Each log entry sent to the external logging provider will follow the same structure.
Example Log Entry
Audit Logs Structure
The unique identifier for the log entry.
The entity responsible for performing or causing the event; this can be a user or service.
The metadata associated with the actor. This varies based on the actor type.
If the actor
field is set to platform
, scimClient
, or unknownUser
, the actorMetadata
field will be an empty object.
The IP address of the actor.
The type of event that occurred. Below you can see a list of possible event types. More event types will be added in the future as we expand our audit logs further.
get-secrets
, delete-secrets
, get-secret
, create-secret
, update-secret
, delete-secret
, get-workspace-key
, authorize-integration
, update-integration-auth
, unauthorize-integration
, create-integration
, delete-integration
, add-trusted-ip
, update-trusted-ip
, delete-trusted-ip
, create-service-token
, delete-service-token
, create-identity
, update-identity
, delete-identity
, login-identity-universal-auth
, add-identity-universal-auth
, update-identity-universal-auth
, get-identity-universal-auth
, create-identity-universal-auth-client-secret
, revoke-identity-universal-auth-client-secret
, get-identity-universal-auth-client-secret
, create-environment
, update-environment
, delete-environment
, add-workspace-member
, remove-workspace-member
, create-folder
, update-folder
, delete-folder
, create-webhook
, update-webhook-status
, delete-webhook
, get-secret-imports
, create-secret-import
, update-secret-import
, delete-secret-import
, update-user-workspace-role
, update-user-workspace-denied-permissions
, create-certificate-authority
, get-certificate-authority
, update-certificate-authority
, delete-certificate-authority
, get-certificate-authority-csr
, get-certificate-authority-cert
, sign-intermediate
, import-certificate-authority-cert
, get-certificate-authority-crl
, issue-cert
, get-cert
, delete-cert
, revoke-cert
, get-cert-body
, create-pki-alert
, get-pki-alert
, update-pki-alert
, delete-pki-alert
, create-pki-collection
, get-pki-collection
, update-pki-collection
, delete-pki-collection
, get-pki-collection-items
, add-pki-collection-item
, delete-pki-collection-item
, org-admin-accessed-project
, create-certificate-template
, update-certificate-template
, delete-certificate-template
, get-certificate-template
, create-certificate-template-est-config
, update-certificate-template-est-config
, get-certificate-template-est-config
, update-project-slack-config
, get-project-slack-config
, integration-synced
, create-shared-secret
, delete-shared-secret
, read-shared-secret
.
The metadata associated with the event. This varies based on the event type.
The user agent of the actor, if applicable.
The type of user agent.
The expiration date of the log entry. When this date is reached, the log entry will be deleted from Infisical.
The creation date of the log entry.
The last update date of the log entry. This is unlikely to be out of sync with the createdAt
field, as we do not update log entries after they’ve been created.
The unique identifier for the organization where the event occurred.
The unique identifier for the project where the event occurred.
The projectId
field will only be present if the event occurred at the project level, not the organization level.
The name of the project where the event occurred.
The projectName
field will only be present if the event occurred at the project level, not the organization level.
Was this page helpful?