Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

https://hello.atlassian.net/wiki/spaces/ITSOL/pages/2330407218/Customer+Logs+functionality+in+Opsgenie+and+JSM#Proposed-log-Identifiers

https://atlassian.slack.com/archives/C04JDKEQEHH/p1686035534526599?thread_ts=1680109947.810339&cid=C04JDKEQEHH

Audit logs are a summary of all logs associated with an integration that help team admins to troubleshoot issues.

View the audit log

Things to do before you start:

To access and work with the audit logs for your team:

  1. In Jira Service Management, go to Settings > Products.

  2. Scroll to the Operations section and select Audit logs from the sidebar.

You’ll see a table of activities, organized by date and the time the activity happened, and the actor who took the action. The actor may be a user or an Atlassian system. Expand a log entry to review the details. You can also copy the JSON version of the log for viewing.

An audit log contains the following information:

  • IDs of and information about alerts, incidents, integrations

  • Details about the owner or member that took the action

  • Details of action taken: For example, Responder added, Alert acknowledged, etc.

  • Integration properties

 Sample JSON

{
"_internalDetails":
{
"incident-raw-id":"8b75f063-937c-4277-80d4-86d4b301ce27",
"incident-alert-type":"Associated"
},
"note":"null",
"snoozedUntil":"null",
"ownerFullName":"null",
"acknowledged":"false",
"isCustomAction":"false",
"integrationName":"One more sync",
"description":"",
"source":"xyz@mytest.com",
"_extraProperties":{
"incident-alert-type":"Associated"
},
"-oldTags":[],
"tinyId":"803",
"alias":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"action":"AddDetails",
"id":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"-customActions":[],
"owner":"",
"eventId":"b3dee76d-a50e-4f4a-b672-adbacadbf49e",
"_parsedData":{
"custom":"false",
"_oldAlert":{
"owner":"",
"_internalDetails":{
"incident-raw-id":"8b75f063-937c-4277-80d4-86d4b301ce27",
"incident-alert-type":"Associated"
},
"closedBy":"",
"acknowledged":"false",
"-actions":[],
"count":"1",
"acknowledgedBy":"",
"source":"xyz@mytest.com",
"_details":{"incident-alert-type":"Associated"
},
"message":"This is a high priority alert",
"priority":"P2",
"snoozed":"false",
"seen":"false",
"-responders":[],
"-tags":[],
"lastAcknowledgeTime":"0",
"entity":"",
"lastOccurredAt":"2023-06-30T22:30:25.746Z",
"status":"open",
"updatedAt":"1688164230672000070"
},
"_newAlert":{
"owner":"",
"_internalDetails":{
"incident-raw-id":"8b75f063-937c-4277-80d4-86d4b301ce27",
"incident-alert-type":"Associated"
},
"closedBy":"",
"acknowledged":"false",
"-actions":[],
"count":"1",
"acknowledgedBy":"",
"source":"xyz@mytest.com",
"_details":{
"incident-alert-type":"Associated"
},
"message":"This is a high priority alert",
"priority":"P2",
"snoozed":"false",
"seen":"false",
"-responders":[],
"-tags":[],
"lastAcknowledgeTime":"0",
"entity":"",
"lastOccurredAt":"2023-06-30T22:30:25.746Z",
"status":"open",
"updatedAt":"1688164230757318015"
},
"eventTime":"2023-06-30T22:30:30.764Z",
"action":"AddDetails",
"_source":{
"sourceType":"incident",
"domain":"incident",
"type":"request",
"configType":"incident"
},
"_customer":{
"cloudId":"336fac08-6a32-4272-86a4-8dd71505d33b",
"name":"jsmops.env",
"timeZone":"Europe/Sofia",
"id":"7471af39-b2fd-4296-a7f1-c51dd4a6bd85",
"locale":"en_US",
"activationId":"28467559-c62f-443d-9877-c4879fb7649b"
},
"_metadata":{
"createdAt":"2023-06-30T22:30:25.746Z",
"tinyId":"803",
"closeTime":"-1",
"alias":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"description":"",
"id":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"_integration":{"id":"0e0b127f-a89a-46eb-831a-b7c1bae17605",
"type":"API"
},
"ownerTeamId":"",
"-customActions":[]
},
"actionOwnerDisplay":"System",
"timestamp":"2023-06-30T22:30:30.764Z"
},
"-newlyAddedTags":[],
"oldPriority":"P2",
"integrationId":"6e422287-b320-4a37-90c7-44ba50f67ad5",
"_details":{
"incident-alert-type":"Associated"
},
"message":"This is a high priority alert",
"priority":"P2",
"_actionSource":{
"sourceType":"incident",
"domain":"incident",
"type":"request",
"configType":"incident"
},
"-responders":[],
"-tags":[],
"actionOwnerDisplay":"System",
"-removedTags":[],
"status":"open"
}

Search and filter the audit log

The audit log lists activities that go as far back as 180 days. You can search for specific integrations, alerts, notification rules, etc. in the search tab; and specify the time interval to search for. Please note: you can search your organizational logs through the Logs Page for the last 2 weeks from that moment. You can refer here for further information and advanced query guidance about the Logs page.

  1. Go to admin.atlassian.com. Select your organization if you have more than one.

  2. Select Security > Audit log.

  3. Enter your search criteria in the text field. You can search for activities with users' names, email addresses, group names, or site names. You must enter an exact term.

  4. Narrow the search results by specifying the dates and activity.

  5. Click Apply to search.

dig into the log by keyword or by time. 

  1. Get detailed: see the details of each change. 

  • No labels