Audit
The DX Cloud Audit section in the Cockpit displays Keycloak event logs.
Select desired cluster
Select your desired cluster from the dropdown menu at the top of the Cockpit.
Keycloak event logs
DX Cloud stores Keycloak client event logs. Audit logs show different actions triggered by your team while they navigate and use the Cockpit. These actions range from logins to those performing backup operations.
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
In addition to the guidance here, there is embedded help available directly in the Cockpit.
Keycloak client event logs
From Audit > Keycloak client events:
View from the Cockpit

-
First, select your desired cluster.
-
View the chart (histogram) to see the logs such as Success (green), Client errors (yellow), and Server errors (red).
-
In the Filters section, you can update the following:
-
Date range: Use the calendar picker for a selected range or select one of the options (e.g., Last 15 minutes).
-
Operation type: Click one or many operation types to filter by (e.g., CLIENT_LOGIN, CLIENT_LOGOUT, REFRESH_TOKEN).
-
Usernames: Enter usernames to filter by (e.g.,
service-account-uptime-kuma,admin). -
Client IDs: Enter Keycloak client IDs to filter by (e.g.,
uptime-kuma,magnolia-cockpit). -
IPs: Enter an IP address to filter by (e.g.,
109.71.102.68).
-
Details table
You can view log details in the Log Details table. Click Download logs (CSV) to download the logs locally. To view a specific log, click the log in the table. This triggers a detailed view of the log.
View from the Cockpit

| Column | Description | Example |
|---|---|---|
Date |
The timestamp when the event occurred, in ISO 8601 format (UTC). |
|
Operation type |
The type of Keycloak client operation that was performed. |
|
Username |
The username or service account that performed the operation. |
|
Client ID |
The Keycloak client identifier associated with the event. |
|
IP |
The IP address from which the operation originated. |
|
Details JSON |
Additional event metadata in JSON format, including token IDs, grant types, scopes, and other operation-specific details. |
|
Keycloak admin event logs
DX Cloud stores Keycloak admin event logs. Audit logs show administrative actions performed by your team in Keycloak, such as user management, client configuration, realm settings, and role assignments.
From Audit > Keycloak admin events:
View from the Cockpit

-
First, select your desired cluster.
-
View the chart (histogram) to see the logs such as Success (green), Client errors (yellow), and Server errors (red).
-
In the Filters section, you can update the following:
-
Date range: Use the calendar picker for a selected range or select one of the options (e.g., Last 15 minutes).
-
Operation type: Click one or many operation types to filter by (e.g., CREATE, UPDATE, DELETE, ACTION).
-
Usernames: Enter usernames to filter by (e.g.,
admin,service-account-cockpit). -
IPs: Enter an IP address to filter by (e.g.,
109.71.102.68). -
Auth realms: Enter authentication realm names to filter by (e.g.,
magnolia,master). -
Auth client IDs: Enter the client ID of the authenticated client to filter by (e.g.,
magnolia-cockpit,admin-cli). -
Resource paths: Enter resource paths to filter by (e.g.,
users/abc123,clients/xyz789). -
Resource types: Enter resource types to filter by (e.g.,
USER,CLIENT,REALM,GROUP,ROLE).
-
Details table
You can view log details in the Log Details table. Click Download logs (CSV) to download the logs locally. To view a specific log, click the log in the table. This triggers a detailed view of the log.
View from the Cockpit

| Column | Description | Example |
|---|---|---|
Date |
The timestamp when the admin event occurred, in ISO 8601 format (UTC). |
|
Operation type |
The type of administrative operation that was performed (e.g., CREATE, UPDATE, DELETE, ACTION). |
|
Username |
The username or service account that performed the administrative operation. |
|
IP |
The IP address from which the administrative operation originated. |
|
Auth realm |
The Keycloak realm in which the administrator was authenticated. |
|
Auth client ID |
The client ID used for authentication when performing the admin operation. |
|
Resource path |
The path to the specific resource that was affected by the operation. |
|
Resource type |
The type of Keycloak resource that was modified (e.g., USER, CLIENT, REALM, GROUP, ROLE). |
|
Details JSON |
Additional event metadata in JSON format, including the representation of changes, error messages, and other operation-specific details. |
|