Edge

Compliance & Monitoring

Audit Log

Comprehensive activity tracking for security, compliance, and operational visibility.

Overview

Edge Network maintains a detailed audit trail of all activity across your account and infrastructure. Every action—from user sign-ins to configuration changes—is logged with timestamps, IP addresses, and contextual details.

The audit log is essential for:

Security Investigations

Quickly identify unauthorized access attempts or suspicious activity patterns.

Compliance Audits

Demonstrate adherence to SOC 2, ISO 27001, GDPR, and other frameworks.

Change Tracking

Understand who changed what and when for troubleshooting and accountability.

Operational Visibility

Monitor team activity and infrastructure operations in real-time.

What's Logged

The audit log aggregates events from all Edge Network services into a single, unified view:

Account Events

Event Description
Sign in User signed in (includes method: email, Google, GitHub)
Password changed Account password was updated
2FA enabled/disabled Two-factor authentication status changed
Session revoked User session was terminated
Profile updated Account profile information was modified

Team Events

Event Description
Member invited Invitation sent to a new team member
Invite accepted Team member accepted an invitation
Invite cancelled Pending invitation was cancelled
Role changed Team member's role was updated
Member removed Team member was removed from the account

CDN Events

Event Description
Deployment created/deleted CDN deployment lifecycle events
Domain added/removed Domain configuration changes
Cache purged Cache invalidation requests
Configuration updated Caching rules or optimization settings changed
SSL certificate issued TLS certificate provisioned or renewed

Compute Events

Event Description
VM created/deleted Virtual machine lifecycle events
VM started/stopped/restarted Power state changes
VM resized Resource allocation changes (vCPU, RAM, storage)
Backup created/restored Backup and recovery operations
Snapshot created/restored Point-in-time snapshot operations

DNS Events

Event Description
Zone created/deleted DNS zone lifecycle events
Record added/updated/deleted DNS record changes
Zone verified Domain ownership verification completed
Zone synced Records synchronized to DNS network

Accessing the Audit Log

  1. Navigate to Account → Activity in your control panel
  2. You'll see a chronological list of all recent activity
  3. Use the filters to narrow down by service (Account, CDN, Compute, DNS) or event level
  4. Use the search box to find specific events by keyword

Screenshot: Activity log with filters

Event Details

Each audit log entry includes:

  • Timestamp — When the event occurred (UTC)
  • Service — Which service the event relates to (Account, CDN, Compute, DNS)
  • Event type — The specific action that was performed
  • Severity level — Info, Success, Warning, or Error
  • Description — Human-readable summary of the event
  • IP address — Source IP for user-initiated actions (where applicable)

Pro tip: Color-coded severity levels help you quickly identify issues. Red (error) and amber (warning) events should be reviewed promptly.

Filtering & Search

The audit log provides several ways to find the events you're looking for:

Filter by Service

Click the service buttons (All, Account, CDN, Compute, DNS) to show only events from that service.

Filter by Severity

Use the dropdown to filter by event level: Info, Success, Warning, or Error.

Keyword Search

Enter keywords in the search box to find events containing that text. Useful for finding events related to specific resources (e.g., a VM name or domain).

Compliance & Audit Readiness

Edge Network's audit log is designed to support your compliance requirements:

SOC 2 Type II

Comprehensive logging supports the security and availability trust principles.

ISO 27001

Audit trails help demonstrate control effectiveness for information security management.

GDPR

Track data access and modifications for data protection compliance.

HIPAA

Audit logging supports access tracking requirements for healthcare workloads.

Enterprise Features

Enterprise customers have access to additional audit log capabilities:

Available on Enterprise Plans

  • Extended log retention (up to 7 years)
  • Log export to your SIEM (Splunk, Datadog, etc.)
  • Custom retention policies by event type
  • API access for programmatic log retrieval
  • Tamper-proof log storage with cryptographic verification
Contact Sales