Skip to main content
The Security Log is a set of chronological records that provides documentary evidence of the sequence of tenant configuration changes, user activities, and other activities not related to business transaction processing. Transaction events logs are available in the Transactions section of the Skill Monitor. To open the Security Log, click Configuration and select the Security Log tab. In this section, events are displayed in the form of a table that contains the following information:
  • The date and time of an event
  • The user who performed the action that triggered an event
  • The event type
  • The name of the skill used to perform the action (if applicable)
  • Additional information about the event
All types of events being tracked are listed in the following table:
ScopeRelated events
UsersUser roles changed
SkillSkill created
Skill copied
Skill published
Skill imported
Skill deleted
Skill Online LearningSkill updated as a result of Online Learning
Document added to document set as a result of Online Learning
Document deleted from document set as a result of Online Learning
Environment variablesSecret created
Secret changed
Secret deleted

Filtering and Exporting Events

You can filter the list of events by skill, by user, and by period. You can select a predefined period or set a custom period by specifying its start and end dates. You can also export the list of events with filters applied in CSV format. The exported file contains the following columns:
  • CorrelationId. The event identifier
  • SkillId. The identifier of the skill used to perform the action (if applicable)
  • UserId . The identifier of the user who performed the action that triggered an event
  • PublishDate . The date and time of an event
  • EventType . The event type
  • Payload . Additional information about the event
Note: Only the first 10 000 events are exported to the file.