Dashboard Guide
Audit Log

Audit Log

The audit log provides a complete, immutable record of all operations performed in your Tenuo Cloud account. Use it for compliance, debugging, and security monitoring.

Viewing the Audit Log

Navigate to Audit Log in the sidebar to see recent events.

Event Information

Each audit entry includes:

FieldDescription
TimestampWhen the operation occurred (UTC)
ActorWho performed the operation (user, API key, or service account)
ActionWhat operation was performed
ResourceThe affected resource (key, revocation, etc.)
ResultSuccess or failure
IP AddressSource IP of the request
DetailsAdditional context about the operation

Filtering Events

Use filters to find specific events:

  • Time Range: Last hour, 24 hours, 7 days, 30 days, or custom
  • Actor: Filter by user, API key, or service account
  • Action: Filter by operation type
  • Resource Type: Keys, revocations, API keys, etc.
  • Result: Success or failure

Audit Event Types

Key Operations

ActionDescription
key.createKey was created
key.rotateKey was rotated
key.revokeKey was revoked
key.suspendKey was suspended
key.enableSuspended key was re-enabled

Revocation Operations

ActionDescription
revocation.createRevocation was created
revocation.deleteRevocation was deleted
srl.regenerateSRL was regenerated
srl.exportSRL was exported

API Key Operations

ActionDescription
api_key.createAPI key was created
api_key.revokeAPI key was revoked
api_key.deleteAPI key was deleted

Authentication Events

ActionDescription
auth.loginUser logged in
auth.logoutUser logged out
auth.failedAuthentication attempt failed

Exporting Audit Logs

Export audit logs for external analysis or compliance:

  1. Set your desired filters
  2. Click Export
  3. Choose format (JSON or CSV)
  4. Download the file

Exports are limited to 10,000 events. Use date filters to export larger ranges in batches.

Retention

Audit logs are retained for:

  • Standard: 90 days
  • Enterprise: 1 year (configurable)

Contact support to discuss extended retention requirements.

Security Monitoring

Use the audit log to detect security issues:

Unusual login patterns

Look for logins from unexpected IP addresses or at unusual times.

Bulk operations

Multiple key revocations or deletions in a short time may indicate compromise.

Failed authentication

Repeated auth.failed events may indicate a brute force attack.

Privilege escalation

Watch for API keys being created with admin scope unexpectedly.

Integrations

SIEM Integration

Export audit logs to your SIEM system:

  1. Set up a webhook for audit events
  2. Forward events to your SIEM (Splunk, Datadog, etc.)
  3. Create alerts based on patterns

Compliance Reports

Generate compliance reports:

  1. Filter by date range and resource type
  2. Export to CSV
  3. Include in your compliance documentation

Best Practices

Review regularly

Schedule weekly reviews of audit logs for unusual activity.

Set up alerts

Use webhooks to alert on critical events like key revocations.

Export for compliance

Regularly export audit logs for compliance documentation.

Correlate with other logs

Cross-reference audit events with your application logs for full context.