User Logs
Netmaker v0.99.0 introduces User Logs, a critical feature designed to enhance system transparency, traceability, and security. This feature records significant system events and user actions, providing administrators with clear visibility into changes within their network infrastructure.
Purpose
Audit Logs are essential for:
Tracking Configuration Changes: Monitor who changed what and when.
Enhancing Security: Detect unauthorized or unexpected operations.
Compliance: Assist in meeting organizational and regulatory audit requirements.
Troubleshooting: Reconstruct event sequences to identify and resolve issues efficiently.
What’s Covered?
The audit log currently tracks actions on all important Netmaker resources:
Users
User-related operations (create, update, delete)
✅ Covered
UserAccessToken
API tokens issued, revoked
✅ Covered
Nodes
Node creation, modification, deletion
✅ Covered
Settings
Platform settings changes
✅ Covered
ACLs
ACL (Access Control List) changes
✅ Covered
Tags
Tag creation, modification, deletion
✅ Covered
User Roles
User role assignments
✅ Covered
User Groups
User groups creation, changes, removal
✅ Covered
User Invites
User invites sent, revoked
✅ Covered
Pending Users
Pending user management (invites, approvals)
✅ Covered
Egress
Egress gateway creation, changes, and removal.
✅ Covered
Network
Network creation, configuration updates, deletion
✅ Covered
Enrolment Keys
Enrolment key creation, updates, and removal
✅ Covered
Desktop App Activity
User connect/disconnect actions on the desktop client
✅ Covered
Last updated
Was this helpful?