Logs Overview

Customer Managed Applies to customer-managed instances of Alation

There are many processes running in the Alation application. Each of the processes writes the details of its operations into a dedicated log file. Log files include details about warnings and errors.

If users experience an issue with Alation, logs will have information about it.

For on-premises instances of Alation, each log file is marked with a date at the end of the day, and a new file is created for the next day’s logs. To optimize disk space, Alation stores a specific number of logs of each type and deletes older logs. You can access most logs from inside the Alation chroot at /opt/alation/site/logs. See below for details about the purpose and location of each specific log file.

For Alation Cloud Service instances of Alation, we store logs for one year. Contact your account manager if you have questions about logs.

Note

Alation provides functionality to bundle and encrypt logs in the Admin Settings. See Sending Encrypted Logs to Alation.

See below for information about logs of Alation components.

Backup V2

Log files:

  • alation_backup.log

Location of logs:

  • From version 2021.3: /opt/alation/site/logs

  • Before 2021.3: /var/log/

This log documents the backup process. It will contain details about errors during the Backup V2 process.

Celery

Log files:

  • celery-alationanalytics_error.log

  • celery-alationanalytics.log

  • celery-beat_error.log

  • celery-beat.log

  • celery-cognates_error.log

  • celery-cognates.log

  • celery-default_error.log

  • celery-default.log

  • celery-fastqueue_error.log

  • celery-fastqueue.log

  • celery-ingestion_error.log

  • celery_ingestion.log

  • celery-metrics.log

  • celery-parsing_error.log

  • celery-parsing.log

  • celery-scheduling_error.log

  • celery-scheduling.log

  • celery-search_error.log

  • celery-search.log

  • celery-stewardship_error.log

  • celery-stewardship.log

  • celery-thinqueue_error.log

  • celery-thinqueue.log

Location of logs:

  • /opt/alation/site/logs

Celery is a process pool that has several different queues. Different types of background tasks run in each queue. Each queue has its own log file, and the name of the queue appears at the end of the file name. For example, celery-cognates.log and celery-cognates_error.log are the log files for the Cognates queue. As another example, celery-beat.log is the log file for the celery-beat process. celery-beat schedules Celery tasks and kicks off repeating tasks.

If your Alation software is having trouble related to data jobs or background tasks, please send all Celery logs to Alation support. Don’t try to pick and choose which Celery logs to send.

The celery-default_error.log file has information about most jobs. It’s a good place to look for information on server failures.

The celery-alationanalytics.log and celery-alationanalytics_error.log logs have information about Alation Analytics tasks. Look at these log files if there are errors in Alation Analytics processes, including ETL or metadata extraction.

If a background task fails that’s related to Compose, look at Connector logs instead of Celery logs.

Connector

Log files:

  • connector.log

  • connector_err.log

  • connector_out.log

  • connector_check.log

  • connector_check_error.log

Location of logs:

  • /opt/alation/site/logs

Connector runs Compose queries. The Connector logs will have information related to Compose, especially query execution errors.

Compose problems can also happen in the main web application (Django). Django logs can also be helpful in identifying issues with Compose.

Django

Log files:

  • alation-debug.log

  • alation-error.log

  • alation-events.log

  • alation-info.log

Location of logs:

  • /opt/alation/site/logs

The alation-debug.log, alation-error.log, and alation-info.log files contain error messages from the main Alation web application. If you see a 500 error or a pop up informing that something is wrong, there should be a corresponding error record in these files. These logs can also be helpful in identifying issues with Compose.

The alation-error.log file has the most basic information. The alation-info.log file has a medium amount of information. The alation-debug.log file has the most detailed information. Time stamps are in Universal Common Time (UTC).

The alation-events.log file contains a record of events related to authentication and permissions. Any confidential data contained in the log will be masked with an asterisk. Messages in the log are in JSON format and always contain the following elements:

  • data - Information about the specific event being logged.

  • level - An indication of the log event level. For alation-events.log, it will always have a value of “EVENT”.

  • header - An object containing information about the trace ID, log level, tenant ID, instance URL, and time stamp.

  • timestamp - The time at which the event occurred.

Starting in Alation version 2023.3.2, the types of events that are logged have been expanded. The following table shows which events are logged, along with sample log messages.

Event Type

Event

Example log messages

Authentication configuration events for external systems

An authentication method is added

{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "6afb7ad8-4dbd-47fd-baa5-2604282f1d16",
    "action": "auth_config_method_added",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "test",
          "type": "external_auth_configuration"
        },
        "attributes": {
          "added": {
            "tenant_id": {
              "value": "tebabt"
            },
            "vault_url": {
              "value": "https://alation-instance.com/"
            },
            "client_id": {
              "value": "id"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "11948470849732592520",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T10:12:34.074278"
  },
  "timestamp": "2023-10-13T10:12:34.074523Z"
}

An authentication method is updated

{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "1b56911f-03b3-4723-bf7d-40019e543221",
    "action": "auth_config_method_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "test",
          "type": "external_auth_configuration"
        },
        "attributes": {
          "updated": {
            "tenant_id": {
              "value": "update_tenant_id"
            },
            "vault_url": {
              "value": "https://alation-instance.com/"
            },
            "client_id": {
              "value": "id"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "15207389475413371583",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T10:25:39.951491"
  },
  "timestamp": "2023-10-13T10:25:39.951689Z"
}

An authentication method is deleted

{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "1da9b503-94dd-4c20-8709-b29163332957",
    "action": "auth_config_method_deleted",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "test",
          "type": "external_auth_configuration"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "9153316891214686000",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T10:28:01.895585"
  },
  "timestamp": "2023-10-13T10:28:01.895770Z"
}

Authentication events for Alation user accounts

Default role is changed

{
 "data": {
   "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
   "msg": "Conf updates for $dict_keys(['alation.roles.default_role'])",
   "requestid": "bcae6e68-3734-42ff-86c4-0d47bafa1fdb"
}
"level": "EVENT",
"header": {
  "traceid": "14382265308526883839",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T10:28:01.895585"
  },
  "timestamp": "2023-10-13T10:28:01.895770Z"
}

Signup moderation preference is enabled or disabled

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "c5cc8fff-35c8-4e4e-bb34-63cbae138c20",
    "action": "site_settings_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "account_policy",
          "type": "SiteSettings"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "16985852351481713873",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:39:52.962963"
  },
  "timestamp": "2023-10-12T08:39:52.963205Z"
}

Authentication events for LDAP

LDAP is enabled

{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['user_group_management.sync_from_directory_provider.enabled'])",
    "requestid": "1f1489f9-5668-4154-a9a0-29a821b2d888"
  },
  "level": "EVENT",
  "header": {
    "traceid": "9758985851910129382",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:12:17.877085"
  },
  "timestamp": "2023-10-12T09:12:17.881874Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.builtin.enabled'])",
    "requestid": "1f1489f9-5668-4154-a9a0-29a821b2d888"
  },
  "level": "EVENT",
  "header": {
    "traceid": "9758985851910129382",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:12:17.877085"
  },
  "timestamp": "2023-10-12T09:12:17.881874Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.enabled'])",
    "requestid": "1f1489f9-5668-4154-a9a0-29a821b2d888"
  },
  "level": "EVENT",
  "header": {
    "traceid": "9758985851910129382",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:12:17.877085"
  },
  "timestamp": "2023-10-12T09:12:17.881874Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.enabled'])",
    "requestid": "1f1489f9-5668-4154-a9a0-29a821b2d888"
  },
  "level": "EVENT",
  "header": {
    "traceid": "9758985851910129382",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:12:17.877085"
  },
  "timestamp": "2023-10-12T09:12:17.881874Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.oidc.enabled'])",
    "requestid": "1f1489f9-5668-4154-a9a0-29a821b2d888"
  },
  "level": "EVENT",
  "header": {
    "traceid": "9758985851910129382",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:12:17.877085"
  },
  "timestamp": "2023-10-12T09:12:17.881874Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['user_group_management.sync_from_directory_provider.protocol'])",
    "requestid": "1f1489f9-5668-4154-a9a0-29a821b2d888"
  },
  "level": "EVENT",
  "header": {
    "traceid": "9758985851910129382",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:12:17.877085"
  },
  "timestamp": "2023-10-12T09:12:17.881874Z"
}

LDAP settings are saved

{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.bind_type'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.bind_password'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.use_ssl'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.attr_uid'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.attr_photo'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.attr_email'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.bind_dn'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.host'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.base_dn'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.attr_title'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.attr_department'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.ts_updated'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.group_membership_search_strategy'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.attr_group'])",
    "requestid": "509c92dc-8231-4529-9d23-7de46078153f"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6624534634578512429",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:08:05.454572"
  },
  "timestamp": "2023-10-12T09:08:05.454860Z"
}

A user logs in with LDAP

{
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "ad851ab8-e81f-440e-8532-9dcc619dd821",
    "action": "user_created",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 7,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "ldap"
        },
        "attributes": {
          "added": {
            "is_active": {
              "value": false
            },
            "last_name": {
              "value": "Riemann"
            },
            "first_name": {
              "value": ""
            },
            "email": {
              "value": "[EMAIL REDACTED]"
            },
            "username": {
              "value": "riemann"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "6129871646809533308",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:32:09.421088"
  },
  "timestamp": "2023-10-12T11:32:09.421468Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "ad851ab8-e81f-440e-8532-9dcc619dd821",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 7,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "license": {
              "value": 4
            },
            "role": {
              "value": 6
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "6129871646809533308",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:32:09.618952"
  },
  "timestamp": "2023-10-12T11:32:09.630849Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "ad851ab8-e81f-440e-8532-9dcc619dd821",
    "action": "group_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 8,
          "type": "Group"
        },
        "additional_info": {
          "is_builtin": false
        },
        "attributes": {
          "added": {
            "users": {
              "value": [
                7
              ]
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "6129871646809533308",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:32:09.828263"
  },
  "timestamp": "2023-10-12T11:32:09.838815Z"
}

A user logs out with LDAP

 {
  "data": {
    "msg": "",
    "action_initiated_by": "7",
    "requestid": "b579d9f7-e31b-4090-be79-5245767c01a8",
    "action": "user_logout",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 7,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "ldap"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "11008404513631510216",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:38:10.687575"
  },
  "timestamp": "2023-10-12T11:38:10.687867Z"
}

Authentication events for OIDC

OIDC authentication is enabled

{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['user_group_management.sync_from_directory_provider.enabled'])",
    "requestid": "0ab5c320-a485-4df9-b217-b3d0500246f4"
  },
  "level": "EVENT",
  "header": {
    "traceid": "10969848557437602915",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:46:31.870027"
  },
  "timestamp": "2023-10-12T09:46:31.881659Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['user_group_management.use_groups_to_manage_user_status'])",
    "requestid": "0ab5c320-a485-4df9-b217-b3d0500246f4"
  },
  "level": "EVENT",
  "header": {
    "traceid": "10969848557437602915",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:46:31.870027"
  },
  "timestamp": "2023-10-12T09:46:31.881659Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['user_group_management.use_groups_to_assign_user_roles'])",
    "requestid": "0ab5c320-a485-4df9-b217-b3d0500246f4"
  },
  "level": "EVENT",
  "header": {
    "traceid": "10969848557437602915",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:46:31.870027"
  },
  "timestamp": "2023-10-12T09:46:31.881659Z"
}

OIDC settings are saved

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "daebad27-64ed-489b-9073-ed261c5221c2",
    "action": "auth_config_method_added",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "oauth_login_config",
          "type": "external_auth_configuration"
        },
        "attributes": {
          "added": {
            "authorize_endpoint": {
              "value": "https://dev-r740qkog.us.auth0.com/authorize"
            },
            "user_info_endpoint": {
              "value": "https://dev-r740qkog.us.auth0.com/userinfo"
            },
            "grant_type": {
              "value": "oidc"
            },
            "subject": {
              "value": "email"
            },
            "attribute_mapping": {
              "value": "{\"email\": [\"username\", \"email\"], \"given_name\": [\"first_name\"], \"family_name\": [\"last_name\"], \"http://alation.com/title\": [\"title\"]}"
            },
            "scope": {
              "value": "openid,profile,email"
            },
            "oauth_provider_end_session_endpoint": {
              "value": "https://dev-r740qkog.us.auth0.com/logout?client_id=OdB3sWr74Rhqsh5VrywRhyIjbGWuXryr"
            },
            "client_id": {
              "value": "OdB3sWr74Rhqsh5VrywRhyIjbGWuXryr"
            },
            "redirect_url": {
              "value": "https://alation-instance.com/auth/oidc/callback/?config_name=oauth_login_config"
            },
            "token_endpoint": {
              "value": "https://dev-r740qkog.us.auth0.com/oauth/token"
            },
            "is_logout_supported": {
              "value": true
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "15426433948760850835",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:38:16.106393"
  },
  "timestamp": "2023-10-12T09:38:16.106755Z"
}

The OIDC connection is tested

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "9ca4dddd-8c60-4b9d-a854-bee3fbfa9549",
    "action": "auth_config_method_added",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "oauth_login_test_config",
          "type": "external_auth_configuration"
        },
        "attributes": {
          "added": {
            "authorize_endpoint": {
              "value": "https://dev-r740qkog.us.auth0.com/authorize"
            },
            "user_info_endpoint": {
              "value": "https://dev-r740qkog.us.auth0.com/userinfo"
            },
            "grant_type": {
              "value": "oidc"
            },
            "subject": {
              "value": "email"
            },
            "attribute_mapping": {
              "value": "{\"email\": [\"username\", \"email\"], \"given_name\": [\"first_name\"], \"family_name\": [\"last_name\"], \"http://alation.com/title\": [\"title\"]}"
            },
            "scope": {
              "value": "openid,profile,email"
            },
            "oauth_provider_end_session_endpoint": {
              "value": "https://dev-r740qkog.us.auth0.com/logout?client_id=OdB3sWr74Rhqsh5VrywRhyIjbGWuXryr"
            },
            "client_id": {
              "value": "OdB3sWr74Rhqsh5VrywRhyIjbGWuXryr"
            },
            "redirect_url": {
              "value": "https://alation-instance.com/auth/oidc/callback/?config_name=oauth_login_test_config"
            },
            "token_endpoint": {
              "value": "https://dev-r740qkog.us.auth0.com/oauth/token"
            },
            "is_logout_supported": {
              "value": true
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "8331639353015385963",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:43:17.589448"
  },
  "timestamp": "2023-10-12T09:43:17.589713Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "0af64437-37b3-433e-848d-d1b98ccaa56b",
    "action": "auth_config_method_deleted",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "oauth_login_test_config",
          "type": "external_auth_configuration"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "1728267408050124393",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:43:20.438469"
  },
  "timestamp": "2023-10-12T09:43:20.456487Z"
}

A user attempts to log in with OIDC

 {
  "data": {
    "msg": "",
    "action_initiated_by": "Unknown",
    "requestid": "9c96b6a2-83ac-4434-bcab-3abd3f8f5b74",
    "action": "login_attempt",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "oidc",
          "type": "login_authentication_mechanism"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "3917158863563449450",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:58:59.980931"
  },
  "timestamp": "2023-10-12T09:58:59.981201Z"
}

An OIDC user is created

{
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "e811e471-068b-4abf-83db-c837bb53b5af",
    "action": "user_created",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 4,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "oidc"
        },
        "attributes": {
          "added": {
            "is_active": {
              "value": true
            },
            "username": {
              "value": "[EMAIL REDACTED]"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "4388102010571841269",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:59:52.134932"
  },
  "timestamp": "2023-10-12T09:59:52.135204Z"
}

An OIDC user is updated

{
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "e811e471-068b-4abf-83db-c837bb53b5af",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 4,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "license": {
              "value": 4
            },
            "role": {
              "value": 6
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "4388102010571841269",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:59:52.405046"
  },
  "timestamp": "2023-10-12T09:59:52.414654Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "e811e471-068b-4abf-83db-c837bb53b5af",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 4,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "oidc"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "value": true
            },
            "last_name": {
              "value": "Automation1"
            },
            "first_name": {
              "value": "Updated_Firstname"
            },
            "email": {
              "value": "[EMAIL REDACTED]"
            },
            "username": {
              "value": "[EMAIL REDACTED]"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "4388102010571841269",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T09:59:52.504092"
  },
  "timestamp": "2023-10-12T09:59:52.514528Z"
}

A user logs out with OIDC

 {
  "data": {
    "msg": "",
    "action_initiated_by": "4",
    "requestid": "4a1b6bf2-1d56-4d48-bd83-547d1b3ebdd8",
    "action": "user_logout",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 4,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "oidc"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "5121145981097685396",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T10:05:29.156086"
  },
  "timestamp": "2023-10-12T10:05:29.156368Z"
}

Authentication events for SAML

SAML authentication is enabled

 {
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.ldap.enabled'])",
    "requestid": "584eeeee-5e11-4c7b-b0c4-464ab6c6b730"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8291655839133883671",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:52:19.531774"
  },
  "timestamp": "2023-10-12T08:52:19.539490Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.builtin.enabled'])",
    "requestid": "584eeeee-5e11-4c7b-b0c4-464ab6c6b730"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8291655839133883671",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:52:19.503476"
  },
  "timestamp": "2023-10-12T08:52:19.503725Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.enabled'])",
    "requestid": "584eeeee-5e11-4c7b-b0c4-464ab6c6b730"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8291655839133883671",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:52:19.566092"
  },
  "timestamp": "2023-10-12T08:52:19.572205Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.oidc.enabled'])",
    "requestid": "584eeeee-5e11-4c7b-b0c4-464ab6c6b730"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8291655839133883671",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:52:19.599229"
  },
  "timestamp": "2023-10-12T08:52:19.605082Z"
}

SAML settings are saved

 {
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.allow_unsolicited'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.673640"
  },
  "timestamp": "2023-10-12T08:47:55.679527Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.want_response_signed'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.572104"
  },
  "timestamp": "2023-10-12T08:47:55.572340Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.want_assertions_signed'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.604201"
  },
  "timestamp": "2023-10-12T08:47:55.610688Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.use_name_id_as_username'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.628590"
  },
  "timestamp": "2023-10-12T08:47:55.634198Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.force_redirect_binding'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.651985"
  },
  "timestamp": "2023-10-12T08:47:55.657002Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.logout_supported'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.696807"
  },
  "timestamp": "2023-10-12T08:47:55.702162Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.logout_requests_signed'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.718426"
  },
  "timestamp": "2023-10-12T08:47:55.725533Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.name_id_policy_format'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.742074"
  },
  "timestamp": "2023-10-12T08:47:55.747526Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.allow_unknown_attributes'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.763783"
  },
  "timestamp": "2023-10-12T08:47:55.769758Z"
}
{
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['alation.authentication.saml.entity_id'])",
    "requestid": "c1ff810f-fe53-4443-aa06-e02f92ce60ee"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8643095728368757541",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:47:55.786372"
  },
  "timestamp": "2023-10-12T08:47:55.791522Z"
}

A new key pair is generated

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "138ca135-e282-4dc3-a1ec-143e291e339e",
    "action": "saml_key_pair_generated",
    "outcome": "success"
  },
  "level": "EVENT",
  "header": {
    "traceid": "8935543297980337359",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:45:09.342309"
  },
  "timestamp": "2023-10-12T08:45:09.342603Z"
}

A PEM file is downloaded

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "362267d7-04f2-4069-8d1d-976f056dd5cb",
    "action": "saml_public.pem_downloaded",
    "outcome": "success"
  },
  "level": "EVENT",
  "header": {
    "traceid": "14862218209604147559",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:45:10.632983"
  },
  "timestamp": "2023-10-12T08:45:10.637585Z"
}

Metadata XML is uploaded

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "91350c98-ebe0-4b1a-8e71-442bf89417b8",
    "action": "saml_idp_metadata_uploaded",
    "outcome": "success"
  },
  "level": "EVENT",
  "header": {
    "traceid": "13500286793418757010",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T08:45:16.702077"
  },
  "timestamp": "2023-10-12T08:45:16.709649Z"
}

A user attempts to log in with SAML

 {
  "data": {
    "msg": "",
    "action_initiated_by": "Unknown",
    "requestid": "c6583837-4a9c-40ac-bba8-2cf2d8eff02d",
    "action": "login_attempt",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "saml",
          "type": "login_authentication_mechanism"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "10693600330416764605",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:18:24.951635"
  },
  "timestamp": "2023-10-12T11:18:24.951891Z"
}

A SAML user is created

 {
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "d09ef49e-d040-461d-81b0-62a07ff4ab43",
    "action": "user_created",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 6,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "saml"
        },
        "attributes": {
          "added": {
            "is_active": {
              "value": false
            },
            "username": {
              "value": "P[EMAIL REDACTED]"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "3606400622321803174",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:18:35.441379"
  },
  "timestamp": "2023-10-12T11:18:35.441696Z"
}

A SAML user is updated

 {
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "d09ef49e-d040-461d-81b0-62a07ff4ab43",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 6,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "license": {
              "value": 4
            },
            "role": {
              "value": 6
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "3606400622321803174",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:18:35.742623"
  },
  "timestamp": "2023-10-12T11:18:35.755098Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "d09ef49e-d040-461d-81b0-62a07ff4ab43",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 6,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "saml"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "value": false
            },
            "last_name": {
              "value": "Kabra"
            },
            "first_name": {
              "value": "Pratik"
            },
            "email": {
              "value": "[EMAIL REDACTED]"
            },
            "username": {
              "value": "P[EMAIL REDACTED]"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "3606400622321803174",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:18:35.982579"
  },
  "timestamp": "2023-10-12T11:18:35.993146Z"
}

Authentication events for OAuth client applications

An OAuth client application is created

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "f4e4bd34-c40e-48b2-80ee-9cbed555fd6f",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "is_suspended": {
              "old_value": false,
              "value": false
            }
          }
        }
      },
      {
        "resource": {
          "id": 2,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "old_value": false,
              "value": true
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "5568541056296547151",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T08:57:08.473277"
  },
  "timestamp": "2023-10-13T08:57:08.479134Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "f4e4bd34-c40e-48b2-80ee-9cbed555fd6f",
    "action": "user_created",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User"
        },
        "attributes": {
          "added": {
            "user_type": {
              "value": 6
            },
            "is_active": {
              "value": true
            },
            "role_val": {
              "value": 0
            },
            "fullname": {
              "value": "oauth-application-test-system-user"
            },
            "title": {
              "value": "OAuth client Application"
            },
            "username": {
              "value": "oauth-application-test-system-user"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "5568541056296547151",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T08:57:08.461242"
  },
  "timestamp": "2023-10-13T08:57:08.461486Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "f4e4bd34-c40e-48b2-80ee-9cbed555fd6f",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "value": true
            },
            "username": {
              "value": "oauth-application-test-system-user"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "5568541056296547151",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T08:57:08.461667"
  },
  "timestamp": "2023-10-13T08:57:08.467064Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "f4e4bd34-c40e-48b2-80ee-9cbed555fd6f",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "license": {
              "value": 0
            },
            "role": {
              "value": 0
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "5568541056296547151",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T08:57:08.467397"
  },
  "timestamp": "2023-10-13T08:57:08.472903Z"
}

An OAuth client application is updated

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "30dcb44a-55bc-4e1b-8e3e-a5969d7bfe71",
    "action": "oauth_v2_client_application_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "58adc720-cd46-4f5b-8781-91490c6b60b9",
          "type": "oauth_v2_client_application"
        },
        "attributes": {
          "updated": {
            "role": {
              "value": "CATALOG_ADMIN"
            },
            "updated_by_user_uuid": {
              "value": "964e1d49-3bf0-4138-a71a-7989a184f64e"
            },
            "special_user_uuid": {
              "value": "3cecf774-1acc-4a6e-90b9-c8912ef6cb32"
            },
            "is_client_credentials_enabled": {
              "value": true
            },
            "name": {
              "value": "oauth-application-test"
            },
            "access_token_expiry": {
              "value": 3604
            },
            "client_type": {
              "value": "CONFIDENTIAL"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "4019011997863411796",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T09:16:03.689310"
  },
  "timestamp": "2023-10-13T09:16:03.696483Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "30dcb44a-55bc-4e1b-8e3e-a5969d7bfe71",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "user_type": {
              "value": 6
            },
            "is_active": {
              "value": true
            },
            "role_val": {
              "value": 2
            },
            "fullname": {
              "value": "oauth-application-test-system-user"
            },
            "title": {
              "value": "OAuth client Application"
            },
            "username": {
              "value": "oauth-application-test-system-user"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "4019011997863411796",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T09:16:03.682365"
  },
  "timestamp": "2023-10-13T09:16:03.682603Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "30dcb44a-55bc-4e1b-8e3e-a5969d7bfe71",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "license": {
              "old_value": 0,
              "value": 0
            },
            "role": {
              "old_value": 0,
              "value": 2
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "4019011997863411796",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T09:16:03.682787"
  },
  "timestamp": "2023-10-13T09:16:03.688892Z"
}

An OAuth client application is deleted

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "7ffc34ae-18cf-4bc5-94f9-4f5e5ace8e01",
    "action": "oauth_v2_client_application_deleted",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "58adc720-cd46-4f5b-8781-91490c6b60b9",
          "type": "oauth_v2_client_application"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "11176605024600238666",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T09:32:44.642018"
  },
  "timestamp": "2023-10-13T09:32:44.647807Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "7ffc34ae-18cf-4bc5-94f9-4f5e5ace8e01",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "value": false
            },
            "username": {
              "value": "oauth-application-test-system-user"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "11176605024600238666",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T09:32:44.635971"
  },
  "timestamp": "2023-10-13T09:32:44.636219Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "7ffc34ae-18cf-4bc5-94f9-4f5e5ace8e01",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "is_suspended": {
              "old_value": false,
              "value": true
            }
          }
        }
      },
      {
        "resource": {
          "id": 2,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "old_value": true,
              "value": false
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "11176605024600238666",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T09:32:44.636427"
  },
  "timestamp": "2023-10-13T09:32:44.641872Z"
}

An OAuth client application’s client secret is regenerated

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "b009df21-c152-4a0e-8455-6b4250834bd3",
    "action": "oauth_v2_client_application_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "58adc720-cd46-4f5b-8781-91490c6b60b9",
          "type": "oauth_v2_client_application"
        },
        "attributes": {
          "updated": {
            "updated_by_user_uuid": {
              "value": "964e1d49-3bf0-4138-a71a-7989a184f64e"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "2322177602443315788",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T09:30:09.486811"
  },
  "timestamp": "2023-10-13T09:30:09.487066Z"
}

OAuth tokens are revoked

 {
  "data": {
    "msg": "Tokens of a client: 58adc720-cd46-4f5b-8781-91490c6b60b9 revoked",
    "action_initiated_by": "1",
    "requestid": "92e937fe-52ad-4aab-b9e3-0a115500e8d7",
    "action": "tokens_revoked",
    "outcome": "success"
  },
  "level": "EVENT",
  "header": {
    "traceid": "18386219518042327472",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T09:19:19.399451"
  },
  "timestamp": "2023-10-13T09:19:19.399704Z"
}

OAuth keys are rotated

 {
  "data": {
    "msg": "JWT signing keys rotated for a tenant:251d849c-e6df-46eb-a261-3979950d22ae",
    "action_initiated_by": "1",
    "requestid": "d598625f-4e1e-409e-a511-5958d6a12a17",
    "action": "jwt_signing_keys_rotated",
    "outcome": "success"
  },
  "level": "EVENT",
  "header": {
    "traceid": "2051235247823110039",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T09:30:52.608044"
  },
  "timestamp": "2023-10-13T09:30:52.608321Z"
}

Data source events

A data source is made public or private

{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "9af1fe2a-43ee-4363-b7df-fd253590b2e8",
    "action": "object_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": "2",
          "type": "Data Source"
        },
        "attributes": {
          "updated": {
            "private": {
              "value": [
                "true"
              ]
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "5887267662627565482",
    "loglevel": "EVENT",
    "tenantid": "fda9cef6-0117-4bc8-83f0-d43a4e85ea19",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2024-01-11T10:17:03.124989"
  },
  "timestamp": "2024-01-11T10:17:03.125255Z"
}

Add a user to a private data source

{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "b99b9feb-13d4-4b9d-9cf7-caeda9b763cd",
    "action": "member_added",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "Data Source"
        },
        "attributes": {
          "added": {
            "user_id": {
              "value": 7
            },
            "user_access_level": {
              "value": "viewer"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "5608334317242302391",
    "loglevel": "EVENT",
    "tenantid": "fda9cef6-0117-4bc8-83f0-d43a4e85ea19",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2024-01-11T10:23:23.863292"
  },
  "timestamp": "2024-01-11T10:23:23.863556Z"
}

Remove a user from a private data source

{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "d2425e85-620a-4f63-a236-c92e0c38c2d4",
    "action": "member_removed",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "Data Source"
        },
        "attributes": {
          "deleted": {
            "user_id": {
              "value": 7
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "17911387855262817561",
    "loglevel": "EVENT",
    "tenantid": "fda9cef6-0117-4bc8-83f0-d43a4e85ea19",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2024-01-11T10:26:02.569917"
  },
  "timestamp": "2024-01-11T10:26:02.570189Z"
}

Table privacy events

A table is made private

 {
  "data": {
    "msg": "",
    "action_initiated_by": "2",
    "requestid": "242b71a5-ec13-4a2d-b864-5eda775f7151",
    "action": "object_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 7583311,
          "type": "Table"
        },
        "attributes": {
          "updated": {
            "restriction_level_type": {
              "old_value": "EXPLICIT",
              "value": "EXPLICIT"
            },
            "restriction_privacy_type": {
              "old_value": "PUBLIC",
              "value": "PRIVATE"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "6594866677716156119",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-16T09:31:37.190843"
  },
  "timestamp": "2023-10-16T09:31:37.190999Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "2",
    "requestid": "242b71a5-ec13-4a2d-b864-5eda775f7151",
    "action": "permissions_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 7583311,
          "type": "Table"
        },
        "attributes": {
          "updated": {
            "action": {
              "value": "VIEW"
            },
            "principals": {
              "value": [
                "user:1",
                "user:71",
                "user:3",
                "user:2",
                "user:5",
                "builtin_principal:1"
              ]
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "6594866677716156119",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-16T09:31:37.190411"
  },
  "timestamp": "2023-10-16T09:31:37.190641Z"
}

Explicit permissions are enabled on a table

{
  "data": {
    "msg": "",
    "action_initiated_by": "2",
    "requestid": "c959e158-cc6d-49f7-9fe2-2706de0ec8e4",
    "action": "object_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 7583311,
          "type": "Table"
        },
        "attributes": {
          "updated": {
            "restriction_level_type": {
              "old_value": "INHERIT",
              "value": "EXPLICIT"
            },
            "restriction_privacy_type": {
              "old_value": "PUBLIC",
              "value": "PUBLIC"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "174973640321785552",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-16T09:28:41.897165"
  },
  "timestamp": "2023-10-16T09:28:41.897292Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "2",
    "requestid": "c959e158-cc6d-49f7-9fe2-2706de0ec8e4",
    "action": "permissions_added",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 7583311,
          "type": "Table"
        },
        "attributes": {
          "added": {
            "action": {
              "value": "VIEW"
            },
            "principals": {
              "value": [
                "user:1",
                "user:2",
                "user:71",
                "user:5",
                "builtin_principal:0",
                "user:3",
                "builtin_principal:1"
              ]
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "174973640321785552",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-16T09:28:41.896716"
  },
  "timestamp": "2023-10-16T09:28:41.896982Z"
}

A user is added to a private table

 {
  "data": {
    "msg": "",
    "action_initiated_by": "2",
    "requestid": "6ec3834d-523b-490a-83a5-09a10e183dab",
    "action": "member_added",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 7583311,
          "type": "Table"
        },
        "attributes": {
          "added": {
            "user": {
              "value": [
                16
              ]
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "876470271294430719",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-16T09:33:34.715978"
  },
  "timestamp": "2023-10-16T09:33:34.716108Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "2",
    "requestid": "6ec3834d-523b-490a-83a5-09a10e183dab",
    "action": "permissions_added",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 7583311,
          "type": "Table"
        },
        "attributes": {
          "added": {
            "action": {
              "value": "VIEW"
            },
            "principals": {
              "value": [
                "user:16"
              ]
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "876470271294430719",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-16T09:33:34.715365"
  },
  "timestamp": "2023-10-16T09:33:34.715781Z"
}

License events

A license file is uploaded

 {
  "data": {
    "requester": "964e1d49-3bf0-4138-a71a-7989a184f64e",
    "msg": "Conf updates for $dict_keys(['alation.install.license.path'])",
    "requestid": "382acab3-3b0c-4a36-bbe1-8168c1452c6d"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6741770202165515532",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T08:51:47.374009"
  },
  "timestamp": "2023-10-13T08:51:47.374323Z"
}
{
  "data": {
    "requester": "964e1d49-3bf0-4138-a71a-7989a184f64e",
    "msg": "Conf updates for $dict_keys(['alation.install.site_id'])",
    "requestid": "382acab3-3b0c-4a36-bbe1-8168c1452c6d"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6741770202165515532",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T08:51:47.435379"
  },
  "timestamp": "2023-10-13T08:51:47.442355Z"
}
{
  "data": {
    "requester": "964e1d49-3bf0-4138-a71a-7989a184f64e",
    "msg": "Conf updates for $dict_keys(['customer.agent.auth_token'])",
    "requestid": "382acab3-3b0c-4a36-bbe1-8168c1452c6d"
  },
  "level": "EVENT",
  "header": {
    "traceid": "6741770202165515532",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T08:51:47.460096"
  },
  "timestamp": "2023-10-13T08:51:47.465514Z"
}

Reply via email setting events

Basic authentication settings changed for Reply via Email feature

 {
  "data": {
    "requester": "e817cb79-02ad-4edf-ba1d-d88cdcd953c7",
    "msg": "Conf updates for $dict_keys(['alation.email.reply_to_email_auth_mode'])",
    "requestid": "dfde6154-d9e7-4a6c-9fc8-1936771acfa9"
  },
  "level": "EVENT",
  "header": {
    "traceid": "11952163920937687963",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T07:15:20.427590"
  },
  "timestamp": "2023-10-13T07:15:20.427805Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "2",
    "requestid": "dfde6154-d9e7-4a6c-9fc8-1936771acfa9",
    "action": "mailbox_created",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 1,
          "type": "MailboxSettings"
        },
        "additional_info": {
          "mailbox_name": "reply"
        },
        "attributes": {
          "added": {
            "server": {
              "value": "imap.gmail.com"
            },
            "password": {
              "value": "*********"
            },
            "port": {
              "value": 993
            },
            "use_ssl": {
              "value": true
            },
            "username": {
              "value": "*********"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "11952163920937687963",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T07:15:20.426803"
  },
  "timestamp": "2023-10-13T07:15:20.427201Z"
}

OAuth authentication (Microsoft modern authentication) settings changed for Reply via Email feature

 {
  "data": {
    "msg": "",
    "action_initiated_by": "2",
    "requestid": "2a0cc9f1-ff1f-4de3-b91f-b118100f40b3",
    "action": "mailbox_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 1,
          "type": "OAuth2MailboxSettings"
        },
        "additional_info": {
          "mailbox_name": "reply"
        },
        "attributes": {
          "updated": {
            "tenant_id": {
              "value": "f8e32097-5c65-485f-9eb7-f40149462461"
            },
            "address": {
              "value": "[EMAIL REDACTED]"
            },
            "client_secret": {
              "value": "*********"
            },
            "type": {
              "value": "microsoft-oauth2"
            },
            "client_id": {
              "value": "1a149025-5f0c-4727-b059-963f814f0af9"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "11375198845599647726",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T07:04:18.123216"
  },
  "timestamp": "2023-10-13T07:04:18.124602Z"
}
{
  "data": {
    "requester": "e817cb79-02ad-4edf-ba1d-d88cdcd953c7",
    "msg": "Conf updates for $dict_keys(['alation.email.reply_to_email_auth_mode'])",
    "requestid": "2a0cc9f1-ff1f-4de3-b91f-b118100f40b3"
  },
  "level": "EVENT",
  "header": {
    "traceid": "11375198845599647726",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T07:04:18.125722"
  },
  "timestamp": "2023-10-13T07:04:18.126351Z"
}
{
  "data": {
    "requester": "e817cb79-02ad-4edf-ba1d-d88cdcd953c7",
    "msg": "Conf updates for $dict_keys(['alation.email.reply_to_email'])",
    "requestid": "2a0cc9f1-ff1f-4de3-b91f-b118100f40b3"
  },
  "level": "EVENT",
  "header": {
    "traceid": "11375198845599647726",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T07:04:18.232264"
  },
  "timestamp": "2023-10-13T07:04:18.232812Z"
}
{
  "data": {
    "requester": "e817cb79-02ad-4edf-ba1d-d88cdcd953c7",
    "msg": "Conf updates for $dict_keys(['alation.email.email_intent_tracking_mode'])",
    "requestid": "2a0cc9f1-ff1f-4de3-b91f-b118100f40b3"
  },
  "level": "EVENT",
  "header": {
    "traceid": "11375198845599647726",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T07:04:18.322268"
  },
  "timestamp": "2023-10-13T07:04:18.322753Z"
}
{
  "data": {
    "requester": "e817cb79-02ad-4edf-ba1d-d88cdcd953c7",
    "msg": "Conf updates for $dict_keys(['alation.email.enable_reply_via_email'])",
    "requestid": "2a0cc9f1-ff1f-4de3-b91f-b118100f40b3"
  },
  "level": "EVENT",
  "header": {
    "traceid": "11375198845599647726",
    "loglevel": "EVENT",
    "tenantid": "1c6ea2c8-0317-4c0b-938d-d706b32f5335",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T07:04:18.346846"
  },
  "timestamp": "2023-10-13T07:04:18.347588Z"
}

User events

A new user registers

 {
  "data": {
    "msg": "",
    "action_initiated_by": "2",
    "requestid": "0677feda-50eb-4a8e-89ce-c0222f5fcea1",
    "action": "user_created",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "builtin"
        },
        "attributes": {
          "added": {
            "is_admin": {
              "value": false
            },
            "password": {
              "value": "******"
            },
            "email": {
              "value": "[EMAIL REDACTED]"
            },
            "username": {
              "value": "[EMAIL REDACTED]"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "9407706094485254793",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T09:27:48.799213"
  },
  "timestamp": "2023-10-11T09:27:48.803488Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "-999999999",
    "requestid": "db98f33e-9a91-4430-9e35-9773ae0100a2",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 3,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "iam"
        },
        "attributes": {
          "updated": {
            "password": {
              "value": "*********"
            },
            "is_active": {
              "value": false
            },
            "last_name": {
              "value": ""
            },
            "first_name": {
              "value": "test1"
            },
            "email": {
              "value": "[EMAIL REDACTED]"
            },
            "username": {
              "value": "[EMAIL REDACTED]"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "1391273607894563861",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T09:34:53.949252"
  },
  "timestamp": "2023-10-11T09:34:53.953562Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "3",
    "requestid": "db98f33e-9a91-4430-9e35-9773ae0100a2",
    "action": "user_created",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 3,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "builtin"
        },
        "attributes": {
          "added": {
            "is_admin": {
              "value": false
            },
            "password": {
              "value": "******"
            },
            "email": {
              "value": "[EMAIL REDACTED]"
            },
            "username": {
              "value": "[EMAIL REDACTED]"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "1391273607894563861",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T09:34:53.953734"
  },
  "timestamp": "2023-10-11T09:34:53.957439Z"
}

A pending new user attempts to log in

 {
  "data": {
    "msg": "Incorrect credentials.",
    "action_initiated_by": "[EMAIL REDACTED]",
    "requestid": "b1193909-e793-430d-a813-a5b8f64d349e",
    "action": "login_attempt",
    "outcome": "failure",
    "event_datum": [
      {
        "resource": {
          "id": "[EMAIL REDACTED]",
          "type": "User"
        },
        "additional_info": {
          "auth_type": "iam",
          "cause": "failure"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "2878765699590220658",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T09:59:35.278734"
  },
  "timestamp": "2023-10-11T09:59:35.279102Z"
}

A pending new user is activated

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "8f03f6a0-9aef-45ff-a324-6926716451aa",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 3,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "value": true
            },
            "username": {
              "value": "[EMAIL REDACTED]"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "1230527837286322392",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T10:04:19.077502"
  },
  "timestamp": "2023-10-11T10:04:19.077740Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "8f03f6a0-9aef-45ff-a324-6926716451aa",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 3,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "license": {
              "old_value": 3,
              "value": 0
            },
            "role": {
              "old_value": 3,
              "value": 2
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "1230527837286322392",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T10:04:19.077898"
  },
  "timestamp": "2023-10-11T10:04:19.082616Z"
}
{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "8f03f6a0-9aef-45ff-a324-6926716451aa",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 3,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "is_suspended": {
              "old_value": false,
              "value": false
            }
          }
        }
      },
      {
        "resource": {
          "id": 3,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "old_value": false,
              "value": true
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "1230527837286322392",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T10:04:19.082810"
  },
  "timestamp": "2023-10-11T10:04:19.086735Z"
}

Email confirmation for a pending new user is bypassed

{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "8254f6cb-a3e1-4fc4-8056-8630ae839532",
    "action": "user_email_confirmation_bypassed",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 3,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_email_confirmed": {
              "old_value": false,
              "value": true
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "12439941891485787286",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T10:09:24.012387"
  },
  "timestamp": "2023-10-11T10:09:24.018495Z"
}

An active user is suspended

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "4e56af0f-5568-4f91-bc63-83bcac098706",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "is_suspended": {
              "old_value": false,
              "value": true
            }
          }
        }
      },
      {
        "resource": {
          "id": 2,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "old_value": true,
              "value": false
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "8599703654445705160",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T05:39:07.434703"
  },
  "timestamp": "2023-10-12T05:39:07.439761Z"
}

A suspended user is activated

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "e665a225-1b2c-494b-9b85-2b46be29ba5c",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "is_suspended": {
              "old_value": true,
              "value": false
            }
          }
        }
      },
      {
        "resource": {
          "id": 2,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "old_value": false,
              "value": true
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "12589866207479997532",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T05:43:27.177718"
  },
  "timestamp": "2023-10-12T05:43:27.185001Z"
}

A suspended user attempts to log in

 {
  "data": {
    "msg": "Incorrect credentials.",
    "action_initiated_by": "[EMAIL REDACTED]",
    "requestid": "c05975a0-aa57-443c-98f7-a1dbb2d42d8b",
    "action": "login_attempt",
    "outcome": "failure",
    "event_datum": [
      {
        "resource": {
          "id": "[EMAIL REDACTED]",
          "type": "User"
        },
        "additional_info": {
          "auth_type": "iam",
          "cause": "failure"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "12742145379023205923",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T05:41:49.920093"
  },
  "timestamp": "2023-10-12T05:41:49.920485Z"
}

An active user logs in

 {
  "data": {
    "msg": "",
    "action_initiated_by": "3",
    "requestid": "1ddb24a9-7af8-4b63-9521-ab3a74c898ee",
    "action": "user_login",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 3,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "iam",
          "username": "[EMAIL REDACTED]"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "15403306291714374411",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T10:14:36.994733"
  },
  "timestamp": "2023-10-11T10:14:36.994987Z"
}

An active user logs out

 {
  "data": {
    "msg": "",
    "action_initiated_by": "3",
    "requestid": "981d80e7-b9fc-43a2-97ec-77ed3c74eb59",
    "action": "user_logout",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 3,
          "type": "User"
        },
        "additional_info": {
          "auth_type": "builtin"
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "14534297855189533273",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T10:12:32.565148"
  },
  "timestamp": "2023-10-11T10:12:32.565514Z"
}

A user’s role is changed

{
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "2c8a161c-f47f-45b6-8ee5-41e681925922",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 2,
          "type": "User Profile"
        },
        "attributes": {
          "updated": {
            "license": {
              "old_value": 0,
              "value": 2
            },
            "role": {
              "old_value": 0,
              "value": 1
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "224886999813638724",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T06:00:53.773851"
  },
  "timestamp": "2023-10-12T06:00:53.774117Z"
}

A user’s email address is changed

 {
  "data": {
    "msg": "",
    "action_initiated_by": "3",
    "requestid": "ffe58a63-4b03-4712-af96-1324100d5069",
    "action": "user_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 3,
          "type": "User"
        },
        "attributes": {
          "updated": {
            "is_active": {
              "value": true
            },
            "email": {
              "value": "[EMAIL REDACTED]"
            },
            "username": {
              "value": "[EMAIL REDACTED]"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "9486457816820188812",
    "loglevel": "EVENT",
    "tenantid": "a15f4ed9-1aa5-4854-b9a6-727d219127a2",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-11T13:02:29.574237"
  },
  "timestamp": "2023-10-11T13:02:29.574562Z"
}

User group events

A new user group is created

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "977245c8-5ae2-47d1-99e9-a7ad545ca671",
    "action": "group_created",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 8,
          "type": "Group"
        },
        "additional_info": {
          "is_builtin": false
        },
        "attributes": {
          "added": {
            "name": {
              "value": "gp1"
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "4735433933777978896",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:23:25.047496"
  },
  "timestamp": "2023-10-12T11:23:25.047761Z"
}

A user group is updated

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "f16b6ff0-48ae-4e13-9e61-5613c50c114a",
    "action": "group_updated",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 8,
          "type": "Group"
        },
        "additional_info": {
          "is_builtin": false
        },
        "attributes": {
          "updated": {
            "name": {
              "value": "gp2"
            },
            "target_role": {
              "value": 4
            }
          }
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "8318969528400998178",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:44:25.708809"
  },
  "timestamp": "2023-10-12T11:44:25.723631Z"
}

A user group is deleted

 {
  "data": {
    "msg": "",
    "action_initiated_by": "1",
    "requestid": "67b13fc6-b820-449f-aff2-11efe34f79ac",
    "action": "group_deleted",
    "outcome": "success",
    "event_datum": [
      {
        "resource": {
          "id": 8,
          "type": "Group"
        },
        "additional_info": {
          "is_builtin": false
        }
      }
    ]
  },
  "level": "EVENT",
  "header": {
    "traceid": "11715392827207108647",
    "loglevel": "EVENT",
    "tenantid": "251d849c-e6df-46eb-a261-3979950d22ae",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-13T08:30:12.265957"
  },
  "timestamp": "2023-10-13T08:30:12.273421Z"
}

Use of custom groups to assign user roles is enabled

 {
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['user_group_management.use_groups_to_manage_user_status'])",
    "requestid": "e3f23df9-b6ed-4bce-bcde-3bc21df63adc"
  },
  "level": "EVENT",
  "header": {
    "traceid": "14240283422153213586",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:49:19.317277"
  },
  "timestamp": "2023-10-12T11:49:19.328394Z"
}

Use of custom groups to suspend users is enabled

 {
  "data": {
    "requester": "e2aa96d6-1fda-4ddf-89df-957731b2a5ba",
    "msg": "Conf updates for $dict_keys(['user_group_management.use_groups_to_manage_user_status'])",
    "requestid": "e3f23df9-b6ed-4bce-bcde-3bc21df63adc"
  },
  "level": "EVENT",
  "header": {
    "traceid": "14240283422153213586",
    "loglevel": "EVENT",
    "tenantid": "96e7f01f-288e-4c9f-bcc9-d11b07b4f29b",
    "instanceurl": "https://alation-instance.com",
    "timestamp": "2023-10-12T11:49:19.317277"
  },
  "timestamp": "2023-10-12T11:49:19.328394Z"
}

Prior to Alation 2023.3.2, the following events are logged:

  • Making a data source public or private

  • Granting, changing, or revoking a user’s or group’s access to a data source

  • Making a table public or private

  • Granting, changing, or revoking a user’s or group’s access to a table

Elasticsearch

Log files:

  • elasticsearch_index_indexing_slowlog.log

  • elasticsearch_index_search_slowlog.log

  • elasticsearch.log

  • elasticsearch_sh.log

Location of logs:

  • /opt/alation/site/logs

Elasticsearch powers the search functionality of Alation. You can use these logs to catch queries and indexing requests that take longer than a given amount of time. This is useful for discovering user-generated search queries that are unacceptably slow.

Alation uses a script to start Elasticsearch with certain flags. If there is an error in that startup script, the error message will be in elasticsearch_sh.log. If Elasticsearch won’t start at all, the errors will be in elasticsearch.log and supervisord.log.

Installer and Updater

Log files:

  • installer.log

Location of logs:

  • /opt/alation/site/logs

Any errors during installation or updates to Alation will appear in this log file.

KVStore

Log files:

  • kvstore.log

Location of logs:

  • /opt/alation/site/logs

KVStore stores the text of ingested queries. Logs related to KVStore will be in kvstore.log.

Nginx

Log file:

  • access.log

  • error.log

Location of logs:

  • /opt/alation/site/logs

Nginx routes incoming requests to uWSGI or to static files. The access.log file has an entry for every HTTP request. The error.log file has an entry for every failed HTTP request. Time stamps are in Eastern Standard Time (EST) time zone.

Both the logs are a good place to look for UI issues. A high number of HTTP/5xx status codes implies server or application instability.

You may want to check Nginx logs if you suspect that the request is somehow not getting to the web application itself. Another reason to check Nginx logs is if you’ve recently changed your Nginx configuration.

Postgres

Log files:

  • pgstartup.log

  • postgresql-[DayOfWeek].log

There’s one postgresql log file for each day of the week. The file name uses the first three letters of the day of the week. For example, postgresql-Fri.log is the log for Friday.

Location of logs:

You must be the root user to access Postgres logs.

Note

Postgres log files are located on the Postgres data disk. You can access the Postgres disk from the Alation chroot and the host system. (See Alation Architecture for more information.)

The location of pgstartup.log is:

  • On host system: /data/pgsql/[PostgresVersion]/

  • In Alation chroot: /var/lib/pgsql/[PostgresVersion]/

The postgresql-[DayOfWeek].log files are located in the pg_log subfolder:

  • On host system: /data/pgsql/[PostgresVersion]/pg_log/

  • In Alation chroot: /var/lib/pgsql/[PostgresVersion]/pg_log/

Your Postgres version depends on what version of Alation you have:

  • Alation before V R6 release: 9.3

  • Alation from V R6 to 2021.2.X: 9.6

  • Alation from 2021.3.X and newer: 13

System

Log File

Alation Version

Location

Alation chroot

pgstartup.log

Before V R6

/var/lib/pgsql/9.3/

V R6 to 2021.2.X

/var/lib/pgsql/9.6/

2021.3.X and later

/var/lib/pgsql/13/

postgresql-*.log

Before V R6

/var/lib/pgsql/9.3/pg_log/

V R6 to 2021.2.X

/var/lib/pgsql/9.6/pg_log/

2021.3.X and later

/var/lib/pgsql/13/pg_log/

Host system

pgstartup.log

Before V R6

/data/pgsql/9.3/

V R6 to 2021.2.X

/data/pgsql/9.6/

2021.3.X and later

/data/pgsql/13/

postgresql-*.log

Before V R6

/data/pgsql/9.3/pg_log/

V R6 to 2021.2.X

/data/pgsql/9.6/pg_log/

2021.3.X and later

/data/pgsql/13/pg_log/

The log file pgstartup.log includes errors during Postgres start. postgresql-*.log has information on operational errors. You may want to look here if you see errors that mention Postgres in the Django or Celery logs.

Public API

Log files:

  • public_api.log

Location of logs:

  • /opt/alation/site/logs

From version 2020.3, Alation logs errors during the use of Alation’s public API in this file.

Redis

Log files:

  • redis.log

Location of logs:

  • /opt/alation/site/logs

If Redis fails to start or crashes, the information will be in this log.

Supervisor

Log files:

  • supervisord.log

Location of logs:

  • /opt/alation/site/logs

Supervisor manages starting and stopping many of the other components of Alation. This log has errors that occur while starting or stopping those processes. For example, if a component won’t start after using alation_supervisor start [component], you can look in this log for details. The Supervisor logs are also a great place to look for information about why a process crashed.

See Supervisor for details on which components Supervisor controls.

Taskserver

Log files:

  • taskserver_check_error.log

  • taskserver_check.log

  • taskserver_err.log

  • taskserver.log

  • taskserver_out.log

Location of logs:

  • /opt/alation/site/logs

Taskserver handles the extraction of metadata from external systems. This log will be useful if metadata extraction, profiling, or query log ingestion fail or have errors.

uWSGI

Log files:

  • uwsgi.log

Location of logs:

  • /opt/alation/site/logs

uWSGI is the core of front end processing. These log files are a great place to look for any UI issues caused by the Alation server. Each request from a user’s browser will get logged here. Specific details of what actually happened in a request will be in the Django logs. Time stamps are in Universal Common Time (UTC).