Identity Cloud creates log events that you can view and analyze for your business needs. There are three different actor types that can initiate a log event:
- User: Interactions of your users with Identity Cloud. For example, authentications done by your users.
- Admin: Configuration changes made by your administrators in the Identity Cloud management console.
- API: Operations performed using the Identity Cloud API.
Log events are retained for 90 days. You can export log events if you want to keep log events beyond the retention period.
The log events is an incubating feature. Currently, not all interactions are already covered by log events. See the list of events for additional information.
Search and Filter
You can filter logs based on status (
failed), and based on a timeframe.
You can also do a free-text search based on any entry element. You can combine filters and free-text search.
Detailed log entries
If you click an entry in the list view, you can get to the detailed view of the entry. The body of the log is shown as a JSON object, while the sidebar displays meta information about the event, such as the date, the device used, and by which actor the log is initiated.
copy icon to grab the contents of the entry.
Exporting log entries
You can export all or the filtered log entries from the list view, if you select an export menu item from the more options menu ︙ in the top right corner. Exporting filtered entries can help with troubleshooting issues by inspecting related events, while exporting all the logs may support archival record keeping.
The exported records are in
Was this page helpful?