Skip to main content
Audit Logs provide a comprehensive record of all operations performed on Vault resources. Every read, write, delete, and administrative action is logged for security monitoring, compliance, and troubleshooting.

Key Features

Complete Tracking

Every Vault operation is logged including reads, writes, deletes, and policy changes.

User Attribution

Each log entry includes who performed the action with username and email.

Filtering & Search

Filter logs by action type, resource, status, and search by path.

CSV Export

Export logs for external analysis, compliance reports, or archival.

Required Permissions

Viewing audit logs requires iam:project:cicd:vault:read permission. Audit logs cannot be modified or deleted by any user.

How to Filter Logs

1

Search by Path

Enter a path pattern in the search box to find operations on specific secrets or folders.
2

Filter by Action

Select an action type from the dropdown:
  • All Actions
  • Read, Write, Delete, List, Create
  • Rollback, Destroy, Revoke
3

Filter by Resource

Select a resource type:
  • All Resources
  • Secrets, Policies, Tokens, Mounts
4

Filter by Status

Filter by operation result:
  • All Status
  • Success
  • Failed
Combine multiple filters to narrow down results. For example: Action = “Delete” + Status = “Failed” to find all failed deletion attempts.

How to Export Logs

1

Apply Filters (Optional)

Set up any filters to limit the export scope.
2

Click Export

Click the download button in the toolbar.
3

Download CSV

A CSV file downloads automatically with all matching log entries.
The exported CSV includes all fields and is suitable for:
  • Compliance reporting
  • External SIEM integration
  • Long-term archival
  • Spreadsheet analysis

Common Use Cases

Security Investigation

Find unauthorized access attempts:
  1. Filter by Status = Failed
  2. Search for sensitive paths
  3. Review user and timestamp patterns

Compliance Audit

Generate access reports:
  1. Filter by Resource = Secret
  2. Export to CSV
  3. Review who accessed what and when

Troubleshooting

Debug permission issues:
  1. Search for the affected path
  2. Find the user’s recent operations
  3. Check for Failed status and error messages

Change Tracking

Monitor configuration changes:
  1. Filter by Action = Write or Delete
  2. Filter by Resource = Policy
  3. Review who changed policies and when

Understanding Failed Operations

Common failure reasons:
ErrorMeaning
Permission deniedToken lacks required policy
Path not foundSecret or resource doesn’t exist
Invalid tokenToken expired or revoked
Rate limitedToo many requests
Seal statusVault is sealed

Troubleshooting

  • Refresh the page or click the refresh button
  • Check that you have read permission for Vault audit logs
  • Logs may take a moment to propagate after operations
  • Clear all filters and search by path
  • Check the time range - logs may be older than displayed period
  • Verify the operation actually occurred (check other logs)
  • Check your permissions
  • Large exports may timeout - try filtering to reduce data
  • Retry after a few moments
  • The user account may have been deleted
  • Operation may have been performed by a service token
  • Root token operations may not have user attribution
  • Audit logging may not be enabled for all mounts
  • Some internal operations are not logged
  • Check with administrator for audit configuration

FAQ

Log retention depends on your Vault and database configuration. Contact your administrator for specific retention policies.
No. For security reasons, secret values are never logged. Only metadata (path, action, user, time) is recorded.
Yes. Every operation including reads is logged. This is important for security auditing to know who accessed sensitive data.
No. Audit logs cannot be modified or deleted to maintain integrity for compliance and security purposes.
Delete soft-deletes a secret version (recoverable). Destroy permanently removes it (irrecoverable). Both are logged separately.
Export logs to an external SIEM system and configure alerts there. The platform does not currently support native alerting on audit events.

Best Practices

Regular Review

  • Schedule weekly reviews of failed operations
  • Monitor for unusual patterns (off-hours access, bulk operations)
  • Track policy changes and token creations

Export & Archive

  • Export logs periodically for compliance
  • Store exports in immutable storage
  • Maintain exports beyond the platform’s retention period if required

Access Control

  • Limit who can view audit logs (sensitive information)
  • Use separate policies for audit log access
  • Monitor access to the audit logs themselves