2022-05-26 10:06:25 -05:00
---
aliases:
2022-12-09 10:36:04 -06:00
- ../../enterprise/auditing/
2022-05-26 10:06:25 -05:00
description: Auditing
keywords:
- grafana
- auditing
- audit
- logs
2023-03-14 10:49:22 -05:00
labels:
products:
- cloud
- enterprise
2022-06-02 11:57:22 -05:00
title: Audit a Grafana instance
weight: 800
2022-05-26 10:06:25 -05:00
---
2020-10-23 03:22:14 -05:00
2022-06-02 11:57:22 -05:00
# Audit a Grafana instance
2020-10-23 03:22:14 -05:00
Auditing allows you to track important changes to your Grafana instance. By default, audit logs are logged to file but the auditing feature also supports sending logs directly to Loki.
2022-10-26 10:08:21 -05:00
Only API requests or UI actions that trigger an API request generate an audit log.
2022-10-28 07:13:40 -05:00
> **Note:** Available in [Grafana Enterprise]({{< relref "../../introduction/grafana-enterprise/" >}}) version 7.3 and later, and [Grafana Cloud Advanced](/docs/grafana-cloud).
2022-05-25 14:31:49 -05:00
2020-10-23 03:22:14 -05:00
## Audit logs
Audit logs are JSON objects representing user actions like:
2020-12-29 09:37:20 -06:00
2021-08-18 09:12:38 -05:00
- Modifications to resources such as dashboards and data sources.
2020-10-23 03:22:14 -05:00
- A user failing to log in.
### Format
2021-04-21 14:37:15 -05:00
Audit logs contain the following fields. The fields followed by ** \*** are always available, the others depend on the type of action logged.
2020-10-23 03:22:14 -05:00
2021-08-06 08:52:36 -05:00
| Field name | Type | Description |
| ----------------------- | ------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| `timestamp` \* | string | The date and time the request was made, in coordinated universal time (UTC) using the [RFC3339 ](https://tools.ietf.org/html/rfc3339#section-5.6 ) format. |
| `user` \* | object | Information about the user that made the request. Either one of the `UserID` or `ApiKeyID` fields will contain content if `isAnonymous=false` . |
| `user.userId` | number | ID of the Grafana user that made the request. |
| `user.orgId` \* | number | Current organization of the user that made the request. |
| `user.orgRole` | string | Current role of the user that made the request. |
| `user.name` | string | Name of the Grafana user that made the request. |
| `user.tokenId` | number | ID of the user authentication token. |
| `user.apiKeyId` | number | ID of the Grafana API key used to make the request. |
| `user.isAnonymous` \* | boolean | If an anonymous user made the request, `true` . Otherwise, `false` . |
| `action` \* | string | The request action. For example, `create` , `update` , or `manage-permissions` . |
| `request` \* | object | Information about the HTTP request. |
| `request.params` | object | Request’ s path parameters. |
| `request.query` | object | Request’ s query parameters. |
2023-02-08 07:57:19 -06:00
| `request.body` | string | Request’ s body. Filled with `<non-marshalable format>` when it isn't a valid JSON. |
2021-08-06 08:52:36 -05:00
| `result` \* | object | Information about the HTTP response. |
| `result.statusType` | string | If the request action was successful, `success` . Otherwise, `failure` . |
| `result.statusCode` | number | HTTP status of the request. |
| `result.failureMessage` | string | HTTP error message. |
2023-02-08 07:57:19 -06:00
| `result.body` | string | Response body. Filled with `<non-marshalable format>` when it isn't a valid JSON. |
2021-08-06 08:52:36 -05:00
| `resources` | array | Information about the resources that the request action affected. This field can be null for non-resource actions such as `login` or `logout` . |
| `resources[x].id` \* | number | ID of the resource. |
| `resources[x].type` \* | string | The type of the resource that was logged: `alert` , `alert-notification` , `annotation` , `api-key` , `auth-token` , `dashboard` , `datasource` , `folder` , `org` , `panel` , `playlist` , `report` , `team` , `user` , or `version` . |
| `requestUri` \* | string | Request URI. |
| `ipAddress` \* | string | IP address that the request was made from. |
| `userAgent` \* | string | Agent through which the request was made. |
| `grafanaVersion` \* | string | Current version of Grafana when this log is created. |
| `additionalData` | object | Additional information that can be provided about the request. |
2021-01-26 10:57:35 -06:00
The `additionalData` field can contain the following information:
| Field name | Action | Description |
| ---------- | ------ | ----------- |
| `loginUsername` | `login` | Login used in the Grafana authentication form. |
2021-08-06 08:52:36 -05:00
| `extUserInfo` | `login` | User information provided by the external system that was used to log in. |
2021-01-26 10:57:35 -06:00
| `authTokenCount` | `login` | Number of active authentication tokens for the user that logged in. |
2021-08-06 08:52:36 -05:00
| `terminationReason` | `logout` | The reason why the user logged out, such as a manual logout or a token expiring. |
2022-10-31 08:53:46 -05:00
| `billing_role` | `billing-information` | The billing role associated with the billing information being sent. |
2020-10-23 03:22:14 -05:00
### Recorded actions
2021-11-12 17:27:36 -06:00
The audit logs include records about the following categories of actions. Each action is
distinguished by the `action` and `resources[...].type` fields in the JSON record.
For example, creating an API key produces an audit log like this:
```json {hl_lines=4}
{
"action": "create",
"resources": [
{
"id": 1,
"type": "api-key"
}
],
"timestamp": "2021-11-12T22:12:36.144795692Z",
"user": {
"userId": 1,
"orgId": 1,
"orgRole": "Admin",
"username": "admin",
"isAnonymous": false,
"authTokenId": 1
},
"request": {
"body": "{\"name\":\"example\",\"role\":\"Viewer\",\"secondsToLive\":null}"
},
"result": {
"statusType": "success",
"statusCode": 200,
"responseBody": "{\"id\":1,\"name\":\"example\"}"
},
"resources": [
{
"id": 1,
"type": "api-key"
}
],
"requestUri": "/api/auth/keys",
"ipAddress": "127.0.0.1:54652",
"userAgent": "Mozilla/5.0 (X11; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/94.0",
"grafanaVersion": "8.3.0-pre"
}
```
Some actions can only be distinguished by their `requestUri` fields. For those actions, the relevant
pattern of the `requestUri` field is given.
2022-10-31 08:53:46 -05:00
Note that almost all these recorded actions are actions that correspond to API requests or UI actions that
trigger an API request. Therefore, the action `{"action": "email", "resources": [{"type": "report"}]}` corresponds
to the action when the user requests a report's preview to be sent through email, and not the scheduled ones.
2021-11-12 17:27:36 -06:00
#### Sessions
| Action | Distinguishing fields |
| -------------------------------- | ------------------------------------------------------------------------------------------ |
| Log in | `{"action": "login-AUTH-MODULE"}` \* |
| Log out \*\* | `{"action": "logout"}` |
| Force logout for user | `{"action": "logout-user"}` |
| Remove user authentication token | `{"action": "revoke-auth-token", "resources": [{"type": "auth-token"}, {"type": "user"}]}` |
| Create API key | `{"action": "create", "resources": [{"type": "api-key"}]}` |
| Delete API key | `{"action": "delete", "resources": [{"type": "api-key"}]}` |
\* Where `AUTH-MODULE` is the name of the authentication module: `grafana` , `saml` ,
`ldap` , etc. \
2022-06-02 11:57:22 -05:00
\*\* Includes manual log out, token expired/revoked, and [SAML Single Logout ]({{< relref "configure-authentication/saml/#single-logout" >}} ).
2021-11-12 17:27:36 -06:00
2022-10-31 08:53:46 -05:00
#### Service accounts
| Action | Distinguishing fields |
| ---------------------------- | ----------------------------------------------------------------------------------------------------- |
| Create service account | `{"action": "create", "resources": [{"type": "service-account"}]}` |
| Update service account | `{"action": "update", "resources": [{"type": "service-account"}]}` |
| Delete service account | `{"action": "delete", "resources": [{"type": "service-account"}]}` |
| Create service account token | `{"action": "create", "resources": [{"type": "service-account"}, {"type": "service-account-token"}]}` |
| Delete service account token | `{"action": "delete", "resources": [{"type": "service-account"}, {"type": "service-account-token"}]}` |
| Hide API keys | `{"action": "hide-api-keys"}` |
| Migrate API keys | `{"action": "migrate-api-keys"}` |
| Migrate API key | `{"action": "migrate-api-keys"}, "resources": [{"type": "api-key"}]}` |
#### Access control
| Action | Distinguishing fields |
| ---------------------------------------- | --------------------------------------------------------------------------------------------------------------------------- |
| Create role | `{"action": "create", "resources": [{"type": "role"}]}` |
| Update role | `{"action": "update", "resources": [{"type": "role"}]}` |
| Delete role | `{"action": "delete", "resources": [{"type": "role"}]}` |
| Assign built-in role | `{"action": "assign-builtin-role", "resources": [{"type": "role"}, {"type": "builtin-role"}]}` |
| Remove built-in role | `{"action": "remove-builtin-role", "resources": [{"type": "role"}, {"type": "builtin-role"}]}` |
| Grant team role | `{"action": "grant-team-role", "resources": [{"type": "team"}]}` |
| Set team roles | `{"action": "set-team-roles", "resources": [{"type": "team"}]}` |
| Revoke team role | `{"action": "revoke-team-role", "resources": [{"type": "role"}, {"type": "team"}]}` |
| Grant user role | `{"action": "grant-user-role", "resources": [{"type": "role"}, {"type": "user"}]}` |
| Set user roles | `{"action": "set-user-roles", "resources": [{"type": "user"}]}` |
| Revoke user role | `{"action": "revoke-user-role", "resources": [{"type": "role"}, {"type": "user"}]}` |
| Set user permissions on folder | `{"action": "set-user-permissions-on-folder", "resources": [{"type": "folder"}, {"type": "user"}]}` |
| Set team permissions on folder | `{"action": "set-team-permissions-on-folder", "resources": [{"type": "folder"}, {"type": "team"}]}` |
| Set basic role permissions on folder | `{"action": "set-basic-role-permissions-on-folder", "resources": [{"type": "folder"}, {"type": "builtin-role"}]}` |
| Set user permissions on dashboard | `{"action": "set-user-permissions-on-dashboards", "resources": [{"type": "dashboard"}, {"type": "user"}]}` |
| Set team permissions on dashboard | `{"action": "set-team-permissions-on-dashboards", "resources": [{"type": "dashboard"}, {"type": "team"}]}` |
| Set basic role permissions on dashboard | `{"action": "set-basic-role-permissions-on-dashboards", "resources": [{"type": "dashboard"}, {"type": "builtin-role"}]}` |
| Set user permissions on team | `{"action": "set-user-permissions-on-teams", "resources": [{"type": "teams"}, {"type": "user"}]}` |
| Set user permissions on service account | `{"action": "set-user-permissions-on-service-accounts", "resources": [{"type": "service-account"}, {"type": "user"}]}` |
| Set user permissions on datasource | `{"action": "set-user-permissions-on-data-sources", "resources": [{"type": "datasource"}, {"type": "user"}]}` |
| Set team permissions on datasource | `{"action": "set-team-permissions-on-data-sources", "resources": [{"type": "datasource"}, {"type": "team"}]}` |
| Set basic role permissions on datasource | `{"action": "set-basic-role-permissions-on-data-sources", "resources": [{"type": "datasource"}, {"type": "builtin-role"}]}` |
2021-11-12 17:27:36 -06:00
#### User management
| Action | Distinguishing fields |
| ------------------------- | ------------------------------------------------------------------- |
| Create user | `{"action": "create", "resources": [{"type": "user"}]}` |
| Update user | `{"action": "update", "resources": [{"type": "user"}]}` |
| Delete user | `{"action": "delete", "resources": [{"type": "user"}]}` |
| Disable user | `{"action": "disable", "resources": [{"type": "user"}]}` |
| Enable user | `{"action": "enable", "resources": [{"type": "user"}]}` |
| Update password | `{"action": "update-password", "resources": [{"type": "user"}]}` |
| Send password reset email | `{"action": "send-reset-email"}` |
| Reset password | `{"action": "reset-password"}` |
| Update permissions | `{"action": "update-permissions", "resources": [{"type": "user"}]}` |
| Send signup email | `{"action": "signup-email"}` |
| Click signup link | `{"action": "signup"}` |
| Reload LDAP configuration | `{"action": "ldap-reload"}` |
| Get user in LDAP | `{"action": "ldap-search"}` |
| Sync user with LDAP | `{"action": "ldap-sync", "resources": [{"type": "user"}]` |
#### Team and organization management
| Action | Distinguishing fields |
| ------------------------------------ | ---------------------------------------------------------------------------- |
| Add team | `{"action": "create", "requestUri": "/api/teams"}` |
| Update team | `{"action": "update", "requestUri": "/api/teams/TEAM-ID"}` \* |
| Delete team | `{"action": "delete", "requestUri": "/api/teams/TEAM-ID"}` \* |
| Add external group for team | `{"action": "create", "requestUri": "/api/teams/TEAM-ID/groups"}` \* |
| Remove external group for team | `{"action": "delete", "requestUri": "/api/teams/TEAM-ID/groups/GROUP-ID"}` \* |
| Add user to team | `{"action": "create", "resources": [{"type": "user"}, {"type": "team"}]}` |
| Update team member permissions | `{"action": "update", "resources": [{"type": "user"}, {"type": "team"}]}` |
| Remove user from team | `{"action": "delete", "resources": [{"type": "user"}, {"type": "team"}]}` |
| Create organization | `{"action": "create", "resources": [{"type": "org"}]}` |
| Update organization | `{"action": "update", "resources": [{"type": "org"}]}` |
| Delete organization | `{"action": "delete", "resources": [{"type": "org"}]}` |
| Add user to organization | `{"action": "create", "resources": [{"type": "org"}, {"type": "user"}]}` |
| Change user role in organization | `{"action": "update", "resources": [{"type": "user"}, {"type": "org"}]}` |
| Remove user from organization | `{"action": "delete", "resources": [{"type": "user"}, {"type": "org"}]}` |
| Invite external user to organization | `{"action": "org-invite", "resources": [{"type": "org"}, {"type": "user"}]}` |
| Revoke invitation | `{"action": "revoke-org-invite", "resources": [{"type": "org"}]}` |
\* Where `TEAM-ID` is the ID of the affected team, and `GROUP-ID` (if present) is the ID of the
external group.
#### Folder and dashboard management
| Action | Distinguishing fields |
| ----------------------------- | ------------------------------------------------------------------------ |
| Create folder | `{"action": "create", "resources": [{"type": "folder"}]}` |
| Update folder | `{"action": "update", "resources": [{"type": "folder"}]}` |
| Update folder permissions | `{"action": "manage-permissions", "resources": [{"type": "folder"}]}` |
| Delete folder | `{"action": "delete", "resources": [{"type": "folder"}]}` |
| Create/update dashboard | `{"action": "create-update", "resources": [{"type": "dashboard"}]}` |
| Import dashboard | `{"action": "create", "resources": [{"type": "dashboard"}]}` |
| Update dashboard permissions | `{"action": "manage-permissions", "resources": [{"type": "dashboard"}]}` |
| Restore old dashboard version | `{"action": "restore", "resources": [{"type": "dashboard"}]}` |
| Delete dashboard | `{"action": "delete", "resources": [{"type": "dashboard"}]}` |
2021-11-23 11:13:00 -06:00
#### Library elements management
| Action | Distinguishing fields |
| ---------------------- | ------------------------------------------------------------------ |
| Create library element | `{"action": "create", "resources": [{"type": "library-element"}]}` |
| Update library element | `{"action": "update", "resources": [{"type": "library-element"}]}` |
| Delete library element | `{"action": "delete", "resources": [{"type": "library-element"}]}` |
2021-11-12 17:27:36 -06:00
#### Data sources management
| Action | Distinguishing fields |
| -------------------------------------------------- | ----------------------------------------------------------------------------------------- |
| Create datasource | `{"action": "create", "resources": [{"type": "datasource"}]}` |
| Update datasource | `{"action": "update", "resources": [{"type": "datasource"}]}` |
| Delete datasource | `{"action": "delete", "resources": [{"type": "datasource"}]}` |
| Enable permissions for datasource | `{"action": "enable-permissions", "resources": [{"type": "datasource"}]}` |
| Disable permissions for datasource | `{"action": "disable-permissions", "resources": [{"type": "datasource"}]}` |
| Grant datasource permission to role, team, or user | `{"action": "create", "resources": [{"type": "datasource"}, {"type": "dspermission"}]}` \* |
| Remove datasource permission | `{"action": "delete", "resources": [{"type": "datasource"}, {"type": "dspermission"}]}` |
2021-11-23 11:13:00 -06:00
| Enable caching for datasource | `{"action": "enable-cache", "resources": [{"type": "datasource"}]}` |
| Disable caching for datasource | `{"action": "disable-cache", "resources": [{"type": "datasource"}]}` |
| Update datasource caching configuration | `{"action": "update", "resources": [{"type": "datasource"}]}` |
2021-11-12 17:27:36 -06:00
\* `resources` may also contain a third item with `"type":` set to `"user"` or `"team"` .
#### Alerts and notification channels management
2021-11-23 11:13:00 -06:00
| Action | Distinguishing fields |
| --------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------- |
| Save alert manager configuration | `{"action": "update", "requestUri": "/api/alertmanager/RECIPIENT/config/api/v1/alerts"}` |
| Reset alert manager configuration | `{"action": "delete", "requestUri": "/api/alertmanager/RECIPIENT/config/api/v1/alerts"}` |
| Create silence | `{"action": "create", "requestUri": "/api/alertmanager/RECIPIENT/api/v2/silences"}` |
| Delete silence | `{"action": "delete", "requestUri": "/api/alertmanager/RECIPIENT/api/v2/silences/SILENCE-ID"}` |
| Create alert | `{"action": "create", "requestUri": "/api/ruler/RECIPIENT/api/v2/alerts"}` |
| Create or update rule group | `{"action": "create-update", "requestUri": "/api/ruler/RECIPIENT/api/v1/rules/NAMESPACE"}` |
| Delete rule group | `{"action": "delete", "requestUri": "/api/ruler/RECIPIENT/api/v1/rules/NAMESPACE/GROUP-NAME"}` |
| Delete namespace | `{"action": "delete", "requestUri": "/api/ruler/RECIPIENT/api/v1/rules/NAMESPACE"}` |
| Test Grafana managed receivers | `{"action": "test", "requestUri": "/api/alertmanager/RECIPIENT/config/api/v1/receivers/test"}` |
| Create or update the NGalert configuration of the user's organization | `{"action": "create-update", "requestUri": "/api/v1/ngalert/admin_config"}` |
| Delete the NGalert configuration of the user's organization | `{"action": "delete", "requestUri": "/api/v1/ngalert/admin_config"}` |
Where the following:
2022-05-17 06:10:20 -05:00
- `RECIPIENT` is `grafana` for requests handled by Grafana or the data source UID for requests forwarded to a data source.
2021-11-23 11:13:00 -06:00
- `NAMESPACE` is the string identifier for the rules namespace.
- `GROUP-NAME` is the string identifier for the rules group.
- `SILENCE-ID` is the ID of the affected silence.
The following legacy alerting actions are still supported:
2021-11-12 17:27:36 -06:00
| Action | Distinguishing fields |
| --------------------------------- | --------------------------------------------------------------------- |
| Test alert rule | `{"action": "test", "resources": [{"type": "panel"}]}` |
| Pause alert | `{"action": "pause", "resources": [{"type": "alert"}]}` |
| Pause all alerts | `{"action": "pause-all"}` |
| Test alert notification channel | `{"action": "test", "resources": [{"type": "alert-notification"}]}` |
| Create alert notification channel | `{"action": "create", "resources": [{"type": "alert-notification"}]}` |
| Update alert notification channel | `{"action": "update", "resources": [{"type": "alert-notification"}]}` |
| Delete alert notification channel | `{"action": "delete", "resources": [{"type": "alert-notification"}]}` |
#### Reporting
| Action | Distinguishing fields |
| ------------------------- | -------------------------------------------------------------------------------- |
| Create report | `{"action": "create", "resources": [{"type": "report"}, {"type": "dashboard"}]}` |
| Update report | `{"action": "update", "resources": [{"type": "report"}, {"type": "dashboard"}]}` |
| Delete report | `{"action": "delete", "resources": [{"type": "report"}]}` |
| Send report by email | `{"action": "email", "resources": [{"type": "report"}]}` |
| Update reporting settings | `{"action": "change-settings"}` |
#### Annotations, playlists and snapshots management
| Action | Distinguishing fields |
| --------------------------------- | ------------------------------------------------------------------------------------ |
| Create annotation | `{"action": "create", "resources": [{"type": "annotation"}]}` |
| Create Graphite annotation | `{"action": "create-graphite", "resources": [{"type": "annotation"}]}` |
| Update annotation | `{"action": "update", "resources": [{"type": "annotation"}]}` |
| Patch annotation | `{"action": "patch", "resources": [{"type": "annotation"}]}` |
| Delete annotation | `{"action": "delete", "resources": [{"type": "annotation"}]}` |
| Delete all annotations from panel | `{"action": "mass-delete", "resources": [{"type": "dashboard"}, {"type": "panel"}]}` |
| Create playlist | `{"action": "create", "resources": [{"type": "playlist"}]}` |
| Update playlist | `{"action": "update", "resources": [{"type": "playlist"}]}` |
| Delete playlist | `{"action": "delete", "resources": [{"type": "playlist"}]}` |
| Create a snapshot | `{"action": "create", "resources": [{"type": "dashboard"}, {"type": "snapshot"}]}` |
| Delete a snapshot | `{"action": "delete", "resources": [{"type": "snapshot"}]}` |
2022-10-31 08:53:46 -05:00
| Delete a snapshot by delete key | `{"action": "delete", "resources": [{"type": "snapshot"}]}` |
2021-11-12 17:27:36 -06:00
#### Provisioning
2022-10-31 08:53:46 -05:00
| Action | Distinguishing fields |
| --------------------------------- | ------------------------------------------ |
| Reload provisioned dashboards | `{"action": "provisioning-dashboards"}` |
| Reload provisioned datasources | `{"action": "provisioning-datasources"}` |
| Reload provisioned plugins | `{"action": "provisioning-plugins"}` |
| Reload provisioned notifications | `{"action": "provisioning-notifications"}` |
| Reload provisioned alerts | `{"action": "provisioning-alerts"}` |
| Reload provisioned access control | `{"action": "provisioning-accesscontrol"}` |
2021-11-12 17:27:36 -06:00
2021-11-23 11:13:00 -06:00
#### Plugins management
| Action | Distinguishing fields |
| ---------------- | ------------------------- |
| Install plugin | `{"action": "install"}` |
| Uninstall plugin | `{"action": "uninstall"}` |
2021-11-12 17:27:36 -06:00
#### Miscellaneous
2022-10-31 08:53:46 -05:00
| Action | Distinguishing fields |
| ------------------------ | ------------------------------------------------------------ |
| Set licensing token | `{"action": "create", "requestUri": "/api/licensing/token"}` |
| Save billing information | `{"action": "billing-information"}` |
#### Generic actions
In addition to the actions listed above, any HTTP request (`POST`, `PATCH` , `PUT` , and `DELETE` )
against the API is recorded with one of the following generic actions.
Furthermore, you can also record `GET` requests. See below how to configure it.
| Action | Distinguishing fields |
| -------------- | ------------------------------ |
| POST request | `{"action": "action"}` |
| PATCH request | `{"action": "partial-update"}` |
| PUT request | `{"action": "update"}` |
| DELETE request | `{"action": "delete"}` |
| GET request | `{"action": "retrieve"}` |
2020-10-23 03:22:14 -05:00
## Configuration
> **Note:** The auditing feature is disabled by default.
Audit logs can be saved into files, sent to a Loki instance or sent to the Grafana default logger. By default, only the file exporter is enabled.
2022-06-02 11:57:22 -05:00
You can choose which exporter to use in the [configuration file ]({{< relref "../configure-grafana/" >}} ).
2020-10-23 03:22:14 -05:00
2021-10-11 09:20:00 -05:00
Options are `file` , `loki` , and `logger` . Use spaces to separate multiple modes, such as `file loki` .
2020-10-23 03:22:14 -05:00
2021-04-21 14:37:15 -05:00
By default, when a user creates or updates a dashboard, its content will not appear in the logs as it can significantly increase the size of your logs. If this is important information for you and you can handle the amount of data generated, then you can enable this option in the configuration.
2020-10-23 03:22:14 -05:00
```ini
[auditing]
# Enable the auditing feature
enabled = false
# List of enabled loggers
loggers = file
# Keep dashboard content in the logs (request or response fields); this can significantly increase the size of your logs.
log_dashboard_content = false
2022-10-31 08:53:46 -05:00
# Keep requests and responses body; this can significantly increase the size of your logs.
2022-07-25 10:15:04 -05:00
verbose = false
2022-10-31 08:53:46 -05:00
# Write an audit log for every status code.
# By default it only logs the following ones: 2XX, 3XX, 401, 403 and 500.
log_all_status_codes = false
# Maximum response body (in bytes) to be audited; 500KiB by default.
# May help reducing the memory footprint caused by auditing.
max_response_size_bytes = 512000
2020-10-23 03:22:14 -05:00
```
Each exporter has its own configuration fields.
### File exporter
Audit logs are saved into files. You can configure the folder to use to save these files. Logs are rotated when the file size is exceeded and at the start of a new day.
```ini
[auditing.logs.file]
# Path to logs folder
path = data/log
# Maximum log files to keep
max_files = 5
# Max size in megabytes per log file
max_file_size_mb = 256
```
### Loki exporter
2020-12-29 09:37:20 -06:00
Audit logs are sent to a [Loki ](/oss/loki/ ) service, through HTTP or gRPC.
2022-05-25 14:31:49 -05:00
> **Note:** The HTTP option for the Loki exporter is available only in Grafana Enterprise version 7.4 and later.
2020-10-23 03:22:14 -05:00
```ini
[auditing.logs.loki]
2020-12-29 09:37:20 -06:00
# Set the communication protocol to use with Loki (can be grpc or http)
type = grpc
# Set the address for writing logs to Loki (format must be host:port)
2020-10-23 03:22:14 -05:00
url = localhost:9095
# Defaults to true. If true, it establishes a secure connection to Loki
tls = true
2023-03-27 15:44:16 -05:00
# Set the tenant ID for Loki communication, which is disabled by default.
# The tenant ID is required to interact with Loki running in multi-tenant mode.
tenant_id =
2020-10-23 03:22:14 -05:00
```
If you have multiple Grafana instances sending logs to the same Loki service or if you are using Loki for non-audit logs, audit logs come with additional labels to help identifying them:
- **host** - OS hostname on which the Grafana instance is running.
- **grafana_instance** - Application URL.
- **kind** - `auditing`
### Console exporter
2022-06-02 11:57:22 -05:00
Audit logs are sent to the Grafana default logger. The audit logs use the `auditing.console` logger and are logged on `debug` -level, learn how to enable debug logging in the [log configuration ]({{< relref "../configure-grafana/#log" >}} ) section of the documentation. Accessing the audit logs in this way is not recommended for production use.