Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

https://hello.atlassian.net/wiki/spaces/ITSOL/pages/2330407218/Customer+Logs+functionality+in+Opsgenie+and+JSM#Proposed-log-Identifiers

https://atlassian.slack.com/archives/C04JDKEQEHH/p1686035534526599?thread_ts=1680109947.810339&cid=C04JDKEQEHH Audit logs are a summary of all the activities associated with an integration that help team admins troubleshoot issues.

View the audit log

Things to do before you start:

To access and work with the audit logs for your team:

  1. In Jira Service Management, go to Settings > Products.

  2. Scroll to the Operations section and select Audit logs from the sidebar.

You’ll see a table of activities, organized by date and the time the activity happened. Expand a log entry to dig into the details. You can also copy the JSON version of the log for viewing. Some log entries may not include the details or the JSON content.

...

An audit log contains the following information:

  • IDs of and information about alerts, incidents, integrations

  • Time stamps, timezones

  • Details of action taken. For example, responder added, alert acknowledged, etc.

  • Integration properties

Following is a detailed audit log entry in JSON format:

Expand
titleSample JSON

{
"_internalDetails":
{
"incident-raw-id":"8b75f063-937c-4277-80d4-86d4b301ce27",
"incident-alert-type":"Associated"
},
"note":"null",
"snoozedUntil":"null",
"ownerFullName":"null",
"acknowledged":"false",
"isCustomAction":"false",
"integrationName":"Another sync",
"description":"",
"source":"xyz@mytest.com",
"_extraProperties":{
"incident-alert-type":"Associated"
},
"-oldTags":[],
"tinyId":"803",
"alias":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"action":"AddDetails",
"id":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"-customActions":[],
"owner":"",
"eventId":"b3dee76d-a50e-4f4a-b672-adbacadbf49e",
"_parsedData":{
"custom":"false",
"_oldAlert":{
"owner":"",
"_internalDetails":{
"incident-raw-id":"8b75f063-937c-4277-80d4-86d4b301ce27",
"incident-alert-type":"Associated"
},
"closedBy":"",
"acknowledged":"false",
"-actions":[],
"count":"1",
"acknowledgedBy":"",
"source":"xyz@mytest.com",
"_details":{"incident-alert-type":"Associated"
},
"message":"This is a high priority alert",
"priority":"P2",
"snoozed":"false",
"seen":"false",
"-responders":[],
"-tags":[],
"lastAcknowledgeTime":"0",
"entity":"",
"lastOccurredAt":"2023-06-30T22:30:25.746Z",
"status":"open",
"updatedAt":"1688164230672000070"
},
"_newAlert":{
"owner":"",
"_internalDetails":{
"incident-raw-id":"8b75f063-937c-4277-80d4-86d4b301ce27",
"incident-alert-type":"Associated"
},
"closedBy":"",
"acknowledged":"false",
"-actions":[],
"count":"1",
"acknowledgedBy":"",
"source":"xyz@mytest.com",
"_details":{
"incident-alert-type":"Associated"
},
"message":"This is a high priority alert",
"priority":"P2",
"snoozed":"false",
"seen":"false",
"-responders":[],
"-tags":[],
"lastAcknowledgeTime":"0",
"entity":"",
"lastOccurredAt":"2023-06-30T22:30:25.746Z",
"status":"open",
"updatedAt":"1688164230757318015"
},
"eventTime":"2023-06-30T22:30:30.764Z",
"action":"AddDetails",
"_source":{
"sourceType":"incident",
"domain":"incident",
"type":"request",
"configType":"incident"
},
"_customer":{
"cloudId":"336fac08-6a32-4272-86a4-8dd71505d33b",
"name":"jsmops.env",
"timeZone":"Europe/Sofia",
"id":"7471af39-b2fd-4296-a7f1-c51dd4a6bd85",
"locale":"en_US",
"activationId":"28467559-c62f-443d-9877-c4879fb7649b"
},
"_metadata":{
"createdAt":"2023-06-30T22:30:25.746Z",
"tinyId":"803",
"closeTime":"-1",
"alias":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"description":"",
"id":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"_integration":{"id":"0e0b127f-a89a-46eb-831a-b7c1bae17605",
"type":"API"
},
"ownerTeamId":"",
"-customActions":[]
},
"actionOwnerDisplay":"System",
"timestamp":"2023-06-30T22:30:30.764Z"
},
"-newlyAddedTags":[],
"oldPriority":"P2",
"integrationId":"6e422287-b320-4a37-90c7-44ba50f67ad5",
"_details":{
"incident-alert-type":"Associated"
},
"message":"This is a high priority alert",
"priority":"P2",
"_actionSource":{
"sourceType":"incident",
"domain":"incident",
"type":"request",
"configType":"incident"
},
"-responders":[],
"-tags":[],
"actionOwnerDisplay":"System",
"-removedTags":[],
"status":"open"
}

Search and filter the audit log

The audit log lists activities that go as far back as 180 days. You can search for specific integrations, alerts, notification rules, etc. in the search tab; and specify the time interval to search for.

  1. In Jira Service Management, go to Settings > Products.

  2. Scroll to the Operations section and select Audit logs from the sidebar.

  3. Enter your search criteria in the text field. You can search for activities with specific keywords or by using the names of users, log category names, etc.

  4. Narrow the search results by applying any number of filters:

    1. Specify a date range, duration, log category, or log level.

    2. Select Update.

  5. Select Apply.