Overview
TheReview audit events
The Audit Log page lists audit events. Use the table controls to narrow the events you want to review, then select an event to view its details. Prerequisites- You belong to a team with the
tenant-adminrole.
- In the Poolside Console, navigate to Security >
Audit Log.
- Use the table controls to narrow the events you want to review. For example, filter by date range, actor type, resource type, or action. Your audit-log retention setting constrains the available date range. If you filter by resource type first, the action filter narrows to show only actions for that resource type.
- Optionally, use the column visibility menu to show or hide columns.
- Select an event row to open its details.
Event details
The event details view provides additional context for a selected audit event. Every event includes:- Actor type (user, service account, or anonymous) and actor identity
- Action recorded
- Resource type
- Timestamp
- Request ID, user agent, and IP address
Configure audit log retention
Poolside stores audit events in its database for the configured retention duration, which defaults to 90 days. During that time, the events are available from the Poolside Console. Poolside removes events older than the retention duration. You can configure retention with a deployment environment variable. Steps-
In the Poolside deployment configuration for
core-api, setFORGE_AUDIT_HOT_STORAGE_RETENTION_DAYSto the number of days to keep audit events available in Poolside. - Apply the configuration using your Poolside deployment workflow, then redeploy Poolside.
Configure S3 export for audit logs
Configure S3 export to have Poolside upload audit logs to S3 as JSON Lines (JSONL) files in Open Cybersecurity Schema Framework (OCSF) format. You can use these files to integrate audit logs with security information and event management (SIEM) systems. Poolside publishes events to S3 in hourly batches, so events can take up to 1 hour to appear. Prerequisites- You have an S3 bucket and region for audit log export.
- If you use Amazon Web Services Key Management Service encryption, you have the key ID.
-
In the Poolside deployment configuration, set the following deployment settings:
Setting Requirement Description FORGE_AUDIT_S3_BUCKETRequired S3 bucket for audit log export. FORGE_AUDIT_S3_REGIONRequired Amazon Web Services region for the S3 bucket. FORGE_AUDIT_S3_PREFIXOptional S3 prefix for audit log objects. Defaults to audit.FORGE_AUDIT_S3_KMS_KEY_IDOptional Amazon Web Services Key Management Service key ID for server-side encryption. - Apply the configuration using your Poolside deployment workflow, then redeploy Poolside.