copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2020-06-10 |
audit log, user access, account log, system events, monitor system events, user access logs |
account |
{:shortdesc: .shortdesc} {:codeblock: .codeblock} {:tip: .tip} {:screen: .screen}
{: #audit-log}
If you have a classic infrastructure account, you can monitor storage replication events by viewing audit logs. Audit logs track the interactions of each user, like login attempts, port speed updates, power restarts, and interactions made by {{site.data.keyword.BluSoftlayer_notm}} infrastructure support staff. {:shortdesc}
{: #view-audit-log}
To view your audit log, go to Manage > Account in the {{site.data.keyword.cloud_notm}} console, and select Audit log. The audit log initially displays the last 25 interactions that were taken by users on the account. You can view up to 200 interactions at any time. Expand the items per page menu to see more results.
{: #view-access-logs}
From the audit log page, you can also see data for each access attempt that is made by a specific user. The logs display a date and time stamp and IP address for each access attempt. Use the following steps to view a user's Access Logs.
- In the console, go to Manage > Account, and select Audit log.
- Then, filter for the user, select the timeframe that you want to view, and choose an object type.
The access log for each user displays the access attempts that were made by that user by date, along with the IP address from which the access attempt was made. Information within the access log is read-only.
{: #grant-access-logs}
The Viewer role or higher on all account management services is required to view the audit log. For classic infrastructure permissions, a user must be assigned the Super user role.