Skip to content

Commit 3d99b18

Browse files
authored
Merge pull request circleci#7532 from circleci/DOCTEAM-814_db_audit-logs
Audit logs
2 parents 30e526d + dac157d commit 3d99b18

File tree

5 files changed

+37
-10
lines changed

5 files changed

+37
-10
lines changed

jekyll/_cci2/audit-logs.adoc

Lines changed: 34 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ version:
1616
== Overview
1717
CircleCI logs important events in the system for audit and forensic analysis purposes. Audit logs are separate from system logs that track performance and network metrics.
1818

19-
CircleCI **server customers** can access the audit log feature from the UI in the link:https://app.circleci.com/[web app]. Complete audit logs may be downloaded from the **Audit Log** page within the **Admin** section of the application as a CSV file. Audit log fields with nested data contain JSON blobs.
19+
CircleCI **server customers**, as well as **Performance and Scale cloud customers**, can access the audit log feature from the UI in the link:https://app.circleci.com/[web app]. Complete audit logs may be downloaded from the **Audit Log** page within the **Admin** section of the application as a CSV file. Audit log fields with nested data contain JSON blobs.
2020

21-
**Cloud customers** can link:https://support.circleci.com/hc/en-us/requests/new[contact CircleCI support] to request an audit log. Only organization admin users can make an audit log request.
21+
All other cloud customers can link:https://support.circleci.com/hc/en-us/requests/new[contact CircleCI support] to request an audit log. Only organization admin users can make an audit log request.
2222

2323
NOTE: In some situations, the internal machinery may generate duplicate events in the audit logs. The `id` field of the downloaded logs is unique per event and can be used to identify duplicate entries.
2424

@@ -63,4 +63,35 @@ The following are the system events that are logged. See `action` in the Field s
6363
- **version:** Version of the event schema. Currently the value will always be 1. Later versions may have different values to accommodate schema changes.
6464
- **scope:** If the target is owned by an Account in the CircleCI domain model, the account field should be filled in with the Account name and ID. This data is a JSON blob that will always contain `id` and `type` and will likely contain `name`.
6565
- **success:** A flag to indicate if the action was successful.
66-
- **request:** If this event was triggered by an external request this data will be populated and may be used to connect events that originate from the same external request. The format is a JSON blob containing `id` (the unique ID assigned to this request by CircleCI).
66+
- **request:** If this event was triggered by an external request, this data will be populated and may be used to connect events that originate from the same external request. The format is a JSON blob containing `id` (the unique ID assigned to this request by CircleCI).
67+
68+
== Request audit logs from the web app
69+
70+
CircleCI server customers, as well as cloud customers on the Performance or Scale plan, can request audit logs from the web app. To have access to this feature, cloud customers must be organization admins.
71+
72+
Navigate to **Organization Settings > Security** to view the Audit Log section. Select a date range from the dropdown, then click the **Request audit logs** button. The earliest start date is one year ago from the current day, and the latest end date is the current day. The data available will depend on the data retention period set per organization, so the returned time period for the data could be less than the requested timeframe.
73+
74+
NOTE: Submitted dates are in UTC. To avoid issues arising from potential time zone differences, CircleCI adds extra time to the request. For example, if you request August 2 - August 5, the returned results will be in the range August 1 - August 6. The audit log request column is also displayed in UTC.
75+
76+
=== Audit log status
77+
78+
In the UI, a status request will show the following information:
79+
80+
- Timeframe requested
81+
- User who made the request
82+
- Date request was made
83+
- Expiry date of the request
84+
- Request status (success, failed, requested)
85+
86+
Successful requests can be active with a download link, active without any data (no download link), or expired (no longer available to download). Successful requests can be downloaded for 10 days.
87+
88+
image::audit-log-request.png[Audit log requests]
89+
90+
Statuses are updated once per hour on the 30-minute mark (for example, 09:30, 10:30, 11:30).
91+
92+
=== Request rate limit
93+
94+
- Performance customers can make one request per 30 day period
95+
- Scale customers can make three requests per 30 day period
96+
97+
If your organization has reached the maximum amount of requests per 30 days, the audit log request feature will be disabled. If you hover over the disabled **Request audit logs** button, a tooltip will appear displaying the date when new requests can be made. Pending requests count toward the rate limit.

jekyll/_cci2/security-server.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,6 @@ WARNING: CircleCI Server version 2.x is no longer a supported release. Please co
1818

1919
This document outlines security features built into CircleCI and related integrations.
2020

21-
toc::[]
22-
2321
[#overview]
2422
== Overview
2523
Security is our top priority at CircleCI. We are proactive and we act on security issues immediately. Report security issues to [email protected] with an encrypted message using our security team's GPG key (ID: 0x4013DDA7, fingerprint: 3CD2 A48F 2071 61C0 B9B7 1AE2 6170 15B8 4013 DDA7).
@@ -50,7 +48,7 @@ A few different external services and technology integration points touch Circle
5048

5149
[#audit-logs]
5250
== Audit logs
53-
The Audit Log feature is only available for CircleCI installed on your servers or private cloud.
51+
The Audit Log feature is available for CircleCI installed on your servers or private cloud.
5452

5553
CircleCI logs important events in the system for audit and forensic analysis purposes. Audit logs are separate from system logs that track performance and network metrics.
5654

jekyll/_cci2/security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ layout: classic-docs
33
title: "How CircleCI handles security"
44
category: [administration]
55
description: "An overview of security measures taken at CircleCI."
6-
---
6+
---
77

88
This document outlines security initiatives talken by CircleCI.
99

jekyll/_cci2/server/operator/circleci-server-security-features.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ version:
1313

1414
This document outlines security features built into CircleCI and related integrations.
1515

16-
toc::[]
17-
1816
[#security-overview]
1917
== Overview
2018
Security is our top priority at CircleCI. We are proactive and we act on security issues immediately. Report security issues to [email protected] with an encrypted message using our security team's GPG key (ID: 0x4013DDA7, fingerprint: 3CD2 A48F 2071 61C0 B9B7 1AE2 6170 15B8 4013 DDA7).
@@ -43,7 +41,7 @@ A few different external services and technology integration points touch Circle
4341

4442
[#audit-logs]
4543
== Audit logs
46-
The audit log feature is only available for CircleCI installed on your servers or private cloud.
44+
The audit log feature is available for CircleCI installed on your servers or private cloud.
4745

4846
CircleCI logs important events in the system for audit and forensic analysis purposes. Audit logs are separate from system logs that track performance and network metrics.
4947

212 KB
Loading

0 commit comments

Comments
 (0)