Compliance & Monitoring
Audit Log
Comprehensive activity tracking for security, compliance, and operational visibility.
Overview
Edge Network maintains a detailed audit trail of all activity across your account and infrastructure. Every action—from user sign-ins to configuration changes—is logged with timestamps, IP addresses, and contextual details.
The audit log is essential for:
Security Investigations
Quickly identify unauthorized access attempts or suspicious activity patterns.
Compliance Audits
Demonstrate adherence to SOC 2, ISO 27001, GDPR, and other frameworks.
Change Tracking
Understand who changed what and when for troubleshooting and accountability.
Operational Visibility
Monitor team activity and infrastructure operations in real-time.
What's Logged
The audit log aggregates events from all Edge Network services into a single, unified view:
Account Events
| Event | Description |
|---|---|
| Sign in | User signed in (includes method: email, Google, GitHub) |
| Password changed | Account password was updated |
| 2FA enabled/disabled | Two-factor authentication status changed |
| Session revoked | User session was terminated |
| Profile updated | Account profile information was modified |
Team Events
| Event | Description |
|---|---|
| Member invited | Invitation sent to a new team member |
| Invite accepted | Team member accepted an invitation |
| Invite cancelled | Pending invitation was cancelled |
| Role changed | Team member's role was updated |
| Member removed | Team member was removed from the account |
CDN Events
| Event | Description |
|---|---|
| Deployment created/deleted | CDN deployment lifecycle events |
| Domain added/removed | Domain configuration changes |
| Cache purged | Cache invalidation requests |
| Configuration updated | Caching rules or optimization settings changed |
| SSL certificate issued | TLS certificate provisioned or renewed |
Compute Events
| Event | Description |
|---|---|
| VM created/deleted | Virtual machine lifecycle events |
| VM started/stopped/restarted | Power state changes |
| VM resized | Resource allocation changes (vCPU, RAM, storage) |
| Backup created/restored | Backup and recovery operations |
| Snapshot created/restored | Point-in-time snapshot operations |
DNS Events
| Event | Description |
|---|---|
| Zone created/deleted | DNS zone lifecycle events |
| Record added/updated/deleted | DNS record changes |
| Zone verified | Domain ownership verification completed |
| Zone synced | Records synchronized to DNS network |
Accessing the Audit Log
- Navigate to Account → Activity in your control panel
- You'll see a chronological list of all recent activity
- Use the filters to narrow down by service (Account, CDN, Compute, DNS) or event level
- Use the search box to find specific events by keyword
Screenshot: Activity log with filters
Event Details
Each audit log entry includes:
- Timestamp — When the event occurred (UTC)
- Service — Which service the event relates to (Account, CDN, Compute, DNS)
- Event type — The specific action that was performed
- Severity level — Info, Success, Warning, or Error
- Description — Human-readable summary of the event
- IP address — Source IP for user-initiated actions (where applicable)
Pro tip: Color-coded severity levels help you quickly identify issues. Red (error) and amber (warning) events should be reviewed promptly.
Filtering & Search
The audit log provides several ways to find the events you're looking for:
Filter by Service
Click the service buttons (All, Account, CDN, Compute, DNS) to show only events from that service.
Filter by Severity
Use the dropdown to filter by event level: Info, Success, Warning, or Error.
Keyword Search
Enter keywords in the search box to find events containing that text. Useful for finding events related to specific resources (e.g., a VM name or domain).
Compliance & Audit Readiness
Edge Network's audit log is designed to support your compliance requirements:
SOC 2 Type II
Comprehensive logging supports the security and availability trust principles.
ISO 27001
Audit trails help demonstrate control effectiveness for information security management.
GDPR
Track data access and modifications for data protection compliance.
HIPAA
Audit logging supports access tracking requirements for healthcare workloads.
Enterprise Features
Enterprise customers have access to additional audit log capabilities:
Available on Enterprise Plans
-
Extended log retention (up to 7 years) -
Log export to your SIEM (Splunk, Datadog, etc.) -
Custom retention policies by event type -
API access for programmatic log retrieval -
Tamper-proof log storage with cryptographic verification