You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: jekyll/_cci2/audit-logs.adoc
+34-3Lines changed: 34 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,9 @@ version:
16
16
== Overview
17
17
CircleCI logs important events in the system for audit and forensic analysis purposes. Audit logs are separate from system logs that track performance and network metrics.
18
18
19
-
CircleCI **server customers** can access the audit log feature from the UI in the link:https://app.circleci.com/[web app]. Complete audit logs may be downloaded from the **Audit Log** page within the **Admin** section of the application as a CSV file. Audit log fields with nested data contain JSON blobs.
19
+
CircleCI **server customers**, as well as **Performance and Scale cloud customers**, can access the audit log feature from the UI in the link:https://app.circleci.com/[web app]. Complete audit logs may be downloaded from the **Audit Log** page within the **Admin** section of the application as a CSV file. Audit log fields with nested data contain JSON blobs.
20
20
21
-
**Cloud customers** can link:https://support.circleci.com/hc/en-us/requests/new[contact CircleCI support] to request an audit log. Only organization admin users can make an audit log request.
21
+
All other cloud customers can link:https://support.circleci.com/hc/en-us/requests/new[contact CircleCI support] to request an audit log. Only organization admin users can make an audit log request.
22
22
23
23
NOTE: In some situations, the internal machinery may generate duplicate events in the audit logs. The `id` field of the downloaded logs is unique per event and can be used to identify duplicate entries.
24
24
@@ -63,4 +63,35 @@ The following are the system events that are logged. See `action` in the Field s
63
63
- **version:** Version of the event schema. Currently the value will always be 1. Later versions may have different values to accommodate schema changes.
64
64
- **scope:** If the target is owned by an Account in the CircleCI domain model, the account field should be filled in with the Account name and ID. This data is a JSON blob that will always contain `id` and `type` and will likely contain `name`.
65
65
- **success:** A flag to indicate if the action was successful.
66
-
- **request:** If this event was triggered by an external request this data will be populated and may be used to connect events that originate from the same external request. The format is a JSON blob containing `id` (the unique ID assigned to this request by CircleCI).
66
+
- **request:** If this event was triggered by an external request, this data will be populated and may be used to connect events that originate from the same external request. The format is a JSON blob containing `id` (the unique ID assigned to this request by CircleCI).
67
+
68
+
== Request audit logs from the web app
69
+
70
+
CircleCI server customers, as well as cloud customers on the Performance or Scale plan, can request audit logs from the web app. To have access to this feature, cloud customers must be organization admins.
71
+
72
+
Navigate to **Organization Settings > Security** to view the Audit Log section. Select a date range from the dropdown, then click the **Request audit logs** button. The earliest start date is one year ago from the current day, and the latest end date is the current day. The data available will depend on the data retention period set per organization, so the returned time period for the data could be less than the requested timeframe.
73
+
74
+
NOTE: Submitted dates are in UTC. To avoid issues arising from potential time zone differences, CircleCI adds extra time to the request. For example, if you request August 2 - August 5, the returned results will be in the range August 1 - August 6. The audit log request column is also displayed in UTC.
75
+
76
+
=== Audit log status
77
+
78
+
In the UI, a status request will show the following information:
79
+
80
+
- Timeframe requested
81
+
- User who made the request
82
+
- Date request was made
83
+
- Expiry date of the request
84
+
- Request status (success, failed, requested)
85
+
86
+
Successful requests can be active with a download link, active without any data (no download link), or expired (no longer available to download). Successful requests can be downloaded for 10 days.
87
+
88
+
image::audit-log-request.png[Audit log requests]
89
+
90
+
Statuses are updated once per hour on the 30-minute mark (for example, 09:30, 10:30, 11:30).
91
+
92
+
=== Request rate limit
93
+
94
+
- Performance customers can make one request per 30 day period
95
+
- Scale customers can make three requests per 30 day period
96
+
97
+
If your organization has reached the maximum amount of requests per 30 days, the audit log request feature will be disabled. If you hover over the disabled **Request audit logs** button, a tooltip will appear displaying the date when new requests can be made. Pending requests count toward the rate limit.
Copy file name to clipboardExpand all lines: jekyll/_cci2/security-server.adoc
+1-3Lines changed: 1 addition & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,6 @@ WARNING: CircleCI Server version 2.x is no longer a supported release. Please co
18
18
19
19
This document outlines security features built into CircleCI and related integrations.
20
20
21
-
toc::[]
22
-
23
21
[#overview]
24
22
== Overview
25
23
Security is our top priority at CircleCI. We are proactive and we act on security issues immediately. Report security issues to [email protected] with an encrypted message using our security team's GPG key (ID: 0x4013DDA7, fingerprint: 3CD2 A48F 2071 61C0 B9B7 1AE2 6170 15B8 4013 DDA7).
@@ -50,7 +48,7 @@ A few different external services and technology integration points touch Circle
50
48
51
49
[#audit-logs]
52
50
== Audit logs
53
-
The Audit Log feature is only available for CircleCI installed on your servers or private cloud.
51
+
The Audit Log feature is available for CircleCI installed on your servers or private cloud.
54
52
55
53
CircleCI logs important events in the system for audit and forensic analysis purposes. Audit logs are separate from system logs that track performance and network metrics.
Copy file name to clipboardExpand all lines: jekyll/_cci2/server/operator/circleci-server-security-features.adoc
+1-3Lines changed: 1 addition & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -13,8 +13,6 @@ version:
13
13
14
14
This document outlines security features built into CircleCI and related integrations.
15
15
16
-
toc::[]
17
-
18
16
[#security-overview]
19
17
== Overview
20
18
Security is our top priority at CircleCI. We are proactive and we act on security issues immediately. Report security issues to [email protected] with an encrypted message using our security team's GPG key (ID: 0x4013DDA7, fingerprint: 3CD2 A48F 2071 61C0 B9B7 1AE2 6170 15B8 4013 DDA7).
@@ -43,7 +41,7 @@ A few different external services and technology integration points touch Circle
43
41
44
42
[#audit-logs]
45
43
== Audit logs
46
-
The audit log feature is only available for CircleCI installed on your servers or private cloud.
44
+
The audit log feature is available for CircleCI installed on your servers or private cloud.
47
45
48
46
CircleCI logs important events in the system for audit and forensic analysis purposes. Audit logs are separate from system logs that track performance and network metrics.
0 commit comments