Audit Logs
Track every configuration change made in KnoxCall with complete audit trail for compliance, security, and troubleshooting.Overview
Audit Logs record all changes to your KnoxCall configuration:- 👤 Who made the change (user email)
- 📝 What was changed (resource type and name)
- ⏰ When it happened (timestamp)
- 🔄 What changed (before/after values)
- 🎯 Action performed (create, update, delete, enable, disable)
- API Logs = Requests proxied through routes
- Audit Logs = Changes to KnoxCall configuration
What’s Tracked
Routes
- ✅ Route created
- ✏️ Route updated (target URL, headers, body, etc.)
- 🗑️ Route deleted
- 🔓 Route enabled/disabled
- 🔄 Route duplicated
Secrets
- ✅ Secret created
- 🔄 Secret version added (rotation)
- ✏️ Secret name updated
- 🗑️ Secret deleted
Clients
- ✅ Client created (IP address added)
- ✏️ Client updated (IP changed, type changed)
- 🗑️ Client deleted
- 🔓 Client enabled/disabled
- 🔗 Client assigned to route
- ❌ Client unassigned from route
Environments
- ✅ Environment created
- ✏️ Environment updated (overrides changed)
- 🗑️ Environment deleted
- 🔄 Environment duplicated
Alerts
- ✅ Alert created
- ✏️ Alert updated (conditions, channels)
- 🗑️ Alert deleted
- 🔓 Alert enabled/disabled
API Keys
- ✅ API key created
- 🗑️ API key revoked
Tenant Settings
- ✏️ Tenant name/slug updated
- 🔄 Subdomain hash rolled
- ⚙️ Feature settings changed
Team Members
- ✅ Team member invited
- 🗑️ Team member removed
- ✏️ Team member role changed
Viewing Audit Logs
Step 1: Navigate to Audit Logs
- Click Monitoring in sidebar
- Select Audit Logs
- See recent changes (most recent first)
Step 2: Use Filters
Filter by Action:Step 3: View Change Details
Click any audit log entry to see full details: Overview:Common Use Cases
Use Case 1: Troubleshooting Configuration Issues
Scenario: Route suddenly stopped working Investigation:- Navigate to Audit Logs
- Filter by Resource Type: Route
- Filter by Resource Name: broken-route
- See recent changes:
- Identify issue: Incorrect URL
- Fix: Revert URL to v1
Use Case 2: Security Audit
Scenario: Quarterly compliance audit Steps:- Export audit logs for last 90 days
- Filter by Action: Delete, Disable
- Review all deletions/disablements
- Verify authorized by appropriate users
- Document for auditor
Use Case 3: Secret Rotation Tracking
Scenario: Verify secrets rotated per policy Steps:- Filter by Resource Type: Secret
- Filter by Action: Update (new version)
- Check last rotation date for each secret
- Identify secrets due for rotation
- Rotate overdue secrets
Use Case 4: Unauthorized Changes
Scenario: Suspect unauthorized configuration changes Steps:- Filter by User: (specific team member)
- Review all changes by that user
- Check timestamps (after hours?)
- Verify changes were authorized
- Take action if unauthorized
Use Case 5: Change Correlation
Scenario: Error rate spiked, find related change Steps:- Note time of spike: 10:30 AM
- Filter audit logs by time: 10:00-10:45 AM
- See changes during that window:
- Identified: Rate limit too restrictive
- Fix: Revert rate limit
Deep Links
Jump to audit logs from: Route Details:- “View History” button → Audit logs for that route
- “View History” button → Secret rotation history
- “View History” button → Client assignment changes
- “View History” button → Alert configuration changes
Audit Log Entry Details
Full Information Captured
User context:- Email address
- User ID
- IP address (where request originated)
- Session ID
- Resource type (route, secret, client, etc.)
- Resource ID
- Resource name
- Tenant ID
- Action (create, update, delete, etc.)
- Timestamp (with timezone)
- Before values (for updates)
- After values (for updates)
- Full diff (JSON format)
Export Options
CSV Export (Pro/Enterprise Only)
What’s exported:- Timestamp
- User email
- Action
- Resource type
- Resource name
- Summary of changes
- Apply filters to select logs
- Click Export button
- CSV downloads automatically
JSON Export (Enterprise Only)
Full audit trail:- Complete JSON for each entry
- Includes before/after values
- All metadata preserved
Retention Policies
By subscription plan:| Plan | Retention Period |
|---|---|
| Starter | 30 days |
| Pro | 1 year |
| Enterprise | Unlimited (customizable) |
- Audit logs automatically deleted
- Export before expiration for permanent records
Compliance Features
SOC 2 / ISO 27001 Requirements
Audit logs support:- ✅ Who: User identification
- ✅ What: Resource and action
- ✅ When: Timestamp with timezone
- ✅ How: Change details (before/after)
- ✅ Integrity: Immutable (cannot be edited)
- ✅ Export: CSV/JSON for auditors
GDPR Compliance
Data captured:- User email addresses (can be pseudonymized)
- IP addresses (can be anonymized)
- Configuration changes (no PII)
- Audit logs deleted per retention policy
- Can export before deletion
Best Practices
1. Regular Review
Weekly:- Review all changes
- Verify authorized
- Identify unauthorized activity
- Export audit logs
- Archive for compliance
- Review trends
2. Document Standard Changes
Create change log:3. Monitor High-Risk Actions
Focus on:- Deletions (routes, secrets, clients)
- Disablements (routes, alerts)
- Secret rotations (ensure scheduled)
- API key revocations (verify authorized)
4. Use Filters for Investigations
Start broad, narrow down:- All changes today
- Filter by resource type (e.g., routes)
- Filter by specific route
- View detailed changes
5. Export for Compliance
Quarterly/Annual:- Export full audit log history
- Store securely (encrypted)
- Provide to auditors when required
- Maintain for legal retention period
Troubleshooting
Issue: “Audit log missing”
Causes:- Change happened before audit logging enabled
- Entry expired (past retention period)
- System issue (rare)
- Verify retention period
- Confirm timestamp within retention
Issue: “Can’t see changes by other users”
Cause: You might be filtering by your user Fix: Clear user filter to see all usersIssue: “Export button disabled”
Cause: Starter plan (export requires Pro/Enterprise) Fix: Upgrade subscription planIssue: “Diff not showing”
Cause: Change type doesn’t support diff (e.g., delete action) Expected: Create and Delete actions don’t have before/after diffRelated Features
- API Logs: Track API request activity (different from config changes)
- Alerts: Set up alerts for specific configuration changes (coming soon)
- Team Management: Control who can make changes
Next Steps
API Logs
View API request logs
Team Management
Manage team access
Routes
Configure routes
Secrets
Manage secrets
Statistics: Level: beginner | Time: 10 minutes | Tags:
audit, compliance, security, tracking, governance