Audit Logs
Comprehensive guide to audit logs in Erebus platform for security monitoring, and activity oversight.
Audit Logs
Audit logs provide complete visibility into all activities within your Erebus projects. Every significant action is automatically tracked, creating an immutable record for security monitoring, and operational oversight.
What are Audit Logs?
Audit logs are automatically generated records that capture all meaningful activities in your Erebus projects. They provide a complete trail of:
- Who performed the action (actor identification)
- What action was performed (create, update, delete)
- When it happened (precise timestamps)
- What was affected (resource type and ID)
- Whether it succeeded or failed (status tracking)
- Why it was done (descriptive context)
[Screenshot placeholder: Audit logs interface showing recent activity]
Tracked Activities
API Key Management
All API key operations are automatically logged:
- Key Creation: New API key generation with environment type
- Key Updates: Label changes and configuration modifications
- Key Status Changes: Enabling, disabling, and revoking keys
- Key Deletion: Permanent key removal (when permitted)
Project Management
Project-level changes are comprehensively tracked:
- Project Creation: New project initialization
- Project Updates: Name changes and configuration modifications
- Project Settings: Webhook URL changes and other settings
- Project Deletion: Project removal attempts and restrictions
System Events
Important system-level activities:
- Configuration Changes: Platform setting modifications
- Error Events: System errors and their resolution
- Performance Events: Significant performance impact events
Audit Log Structure
Each audit log entry contains the following information:
Core Fields
Actor Information
- User ID: Unique identifier of the person who performed the action
- User Name: Display name of the actor
- User Image: Profile image for visual identification in the interface
Action Details
- Action Type:
create,update, ordelete - Action Description: Human-readable summary of what was done
- Entity Type: The type of resource affected (e.g., "api_key", "project")
- Entity ID: Unique identifier of the affected resource
Timing and Status
- Timestamp: Precise date and time when the action occurred
- Status: Boolean indicating success (
true) or failure (false) - Description: Detailed human-readable explanation of the event
Example Audit Log Entry
{
"id": "01HQXYZ123ABC456DEF789",
"actorId": "user_01HQXYZ123ABC456",
"action": "create",
"actionDescription": "Generated new API key",
"entityType": "api_key",
"entityId": "key_01HQXYZ789DEF123ABC456",
"projectId": "proj_01HQXYZ456ABC789DEF123",
"description": "Created development API key 'My Dev Key' for project 'My Chat App'",
"status": true,
"createdAt": 1699123456789
}Accessing Audit Logs
Platform Dashboard
[Screenshot placeholder: Navigation to audit logs section]
- Navigate to Your Project: Select the project you want to audit
- Open Audit Logs: Click "Audit Logs" in the project sidebar
- View Recent Activity: See the most recent 100 audit events
Audit Log Interface
[Screenshot placeholder: Audit logs list with filters and search]
The audit log interface provides:
- Chronological Listing: Events ordered by most recent first
- Visual Timeline: Easy-to-scan activity timeline with user avatars
- Detailed Descriptions: Human-readable explanations of each event
- Status Indicators: Clear success/failure visual indicators
- Actor Attribution: See who performed each action
Empty State
[Screenshot placeholder: Empty audit logs state]
When no audit events exist yet:
- Clean interface explaining what will be tracked
- Links to documentation for understanding audit logs
- Guidance on actions that will generate audit events
Retention and Limits
Current Retention Policy
- Event Count: 100 most recent audit events per project
- Time Limit: No time-based expiration (count-based only)
- Storage: Events are permanently retained until displaced by newer events
Retention Policy
The system currently retains the 100 most recent audit events per project. Older events are automatically removed as new events are added. Time-based retention policies may be introduced in future updates.
Event Ordering
- Chronological Order: Events are ordered by creation timestamp
- Real-Time Updates: New events appear immediately after actions
- Consistent Numbering: Each event has a unique identifier for reference
Security
Security Monitoring
Audit logs enable comprehensive security oversight:
Unauthorized Access Detection
- Monitor for unexpected API key creation or modification
- Track unusual project setting changes
- Identify suspicious authentication patterns
Access Pattern Analysis
- Review who is accessing which projects and when
- Identify unusual activity patterns or timing
- Monitor for privilege escalation attempts
Change Management
- Track all configuration changes with full attribution
- Maintain accountability for system modifications
- Enable rollback planning with complete change history
Best Practices
Regular Review
Establish Review Schedules
- Daily: Quick scan for any unusual activity
- Weekly: Detailed review of all changes and access patterns
- Monthly: Comprehensive audit of all activities and trends
Key Indicators to Monitor
- Failed authentication attempts
- API key modifications outside business hours
- Unexpected project configuration changes
- High-volume activity patterns
Security Workflows
Incident Response
- Initial Detection: Use audit logs to identify security events
- Impact Assessment: Review all related audit entries
- Timeline Construction: Build chronological sequence of events
- Attribution: Identify all actors involved in the incident
Preventive Measures
- Regular audit of API key usage and permissions
- Monitoring for dormant keys that should be revoked
- Verification of project access patterns
Integration with Security Tools
While Erebus doesn't currently provide audit log export, you can:
Manual Documentation
- Screenshot important audit events for records
- Document significant changes in your security log
- Maintain correlation with external security events
Future Integrations
- API access for programmatic audit log retrieval (planned)
- SIEM integration capabilities (under consideration)
- Automated alerting for suspicious patterns (roadmap item)
Interpreting Common Audit Events
API Key Events
[Screenshot placeholder: API key audit events with descriptions]
"Generated new API key"
- Trigger: User creates a new API key via the dashboard
- Important Data: Environment type (dev/prod), key label
- Security Note: Monitor for unexpected key generation
"Revoked API key"
- Trigger: User permanently revokes an API key
- Important Data: Which key was revoked and why
- Security Note: Verify revocation was intentional
"Updated API key status"
- Trigger: User enables or disables an API key
- Important Data: Status change direction (active/disabled)
- Security Note: Monitor for unauthorized status changes
Project Events
[Screenshot placeholder: Project audit events with descriptions]
"Created new project"
- Trigger: User creates a project via the dashboard
- Important Data: Project name and region selection
- Security Note: Monitor for unexpected project creation
"Updated project settings"
- Trigger: User modifies project configuration
- Important Data: Which settings were changed
- Security Note: Verify webhook URL changes are legitimate
Troubleshooting Audit Logs
Missing Events
Events Not Appearing
- Immediate Check: Refresh the audit logs page
- Timing: Some events may have a few seconds delay
- Permissions: Verify you have access to the project
Historical Events Missing
- Retention Limit: Only 100 most recent events are kept
- Project Scope: Events are project-specific
- Time Range: Check if you're looking at the correct project
Understanding Event Details
Cryptic Descriptions
- Context: Refer to the action type and entity type for clarity
- Timestamps: Use timestamps to correlate with your actions
- Status: Check success/failure status for troubleshooting
Multiple Similar Events
- Batch Operations: Some actions may generate multiple audit events
- Retry Logic: Failed actions may create multiple entries
- User Actions: Rapid successive actions will all be logged
Getting Help
Documentation Resources
- Getting Started Guide - Basic platform usage
- API Key Management - Key security practices
- Project Management - Project configuration
Direct Support
- Email: support@erebus.sh for audit log questions
- Response Time: Direct support for security and compliance issues
- Documentation: Comprehensive guides and troubleshooting help
Security First: Audit logs are a critical component of your security posture. Review them regularly and use them proactively to maintain the security of your real-time infrastructure.