Skip to main content

Log Viewer

Understand the features of Log Viewer

In the Pangea User Console under the COMPLIANCE section, select Secure Audit Logs >> View Logs to access the console-based Log Viewer. By default, the most recent seven days of log events will be returned for viewing. This area can be used to search, view, and verify tamperproofing of all logs stored by the service.

The search bar allows searching log event fields with a <field_name>:<value> syntax. Learn more about the supported search syntax.

Field-specific searches

The filter icon can be clicked to bring up a list of available search fields. Type values in the search fields and then click Search. The resulting search syntax will appear in the search bar, and any matching results will appear in the table below.

Date restrictions

All searches must be restricted to a time range. The default time range for any search is seven days. The date range selector can be found as a drop-down to the left of the search button. Several options are available to enable easy searching:

  • Quick selections
    • These provide quickly selectable relative date ranges for 1, 7, and 30 days.
  • Relative
    • Use "Relative" to search for data relative to the current date (e.g., the last 30 days).
  • Between
    • Use "between" to search for log events between two specific dates.
  • Before
    • Use "before" to search for log records occurring before a specified date.
  • After
    • User "after" to search for log records occurring after a specified date.

Results

By default, the log viewer results will display the Time and Message fields as columns in the search results. To display additional fields, the gear icon can be clicked. All fields except old and new are available to add to the tabular display.

Event details

To view all event fields, click the row from the search results. The click action will expand the row and reveal all event fields, even those that are not configured for display in the tabular view. If message, old, or new contain JSON data, they will be displayed in an interactive JSON tree.

Field comparison

A common requirement for audit logs is to record the value of a field before and after a change is made. This allows the history of values to be recorded upon recalling update events.

The log viewer natively highlights differences between the values stored in the old and new fields in yellow.

Tamperproof information

Records returned by the Log Viewer will be returned alongside icons indicating the tamperproof status of each record. For more information, see the Tamperproofing page.

  • Lock icon
    • The lock icon indicates that the membership proof for the corresponding log event has been verified.
  • Green line
    • The green line indicates that the consistency proof for the two adjacent log events has been verified.

Clicking the lock icon will produce a pop-up providing the information required to independently verify each log event:

  • Status
    • The statuses here are "verifying," "unverified," and "failed." If the state is "failed" the lock will appear red. Records that are still cached will appear unverified until they are committed from the cache.
  • Verification Artifacts
    • This includes the message hash, membership proof, consistency proof, root hash, and a link to the published root hash.
  • Verification Command
    • A command that can be used with the Python SDK to verify the tamperproof status of the record.

The icons will appear asynchronously after search results have been returned, as they are verified.

Was this article helpful?

Contact us