Skip to main content
Stellarbridge Docs
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

audit logging

This page explains how Stellarbridge records security‑relevant activity and how administrators can access and manage audit information.


Layer 1 — Fundamentals (What and Why)

  • What is audit logging in Stellarbridge?
    • Audit logging is the recording of security‑relevant events in a structured, tamper‑resistant way. Today this includes authentication outcomes (sign‑in success/failure) and transfer receipts (who sent/received a file, when, size, status).
  • Why it matters
    • Compliance: demonstrate who did what, when, and from where.
    • Investigations: reconstruct timelines quickly using consistent timestamps.
    • Operations: monitor access patterns and transfer activity.
  • Where logs live
    • Application audit events are written asynchronously to the application database for durability.
    • HTTP access logs (request method/path/status/latency) are emitted to stdout/stderr in JSON format for your log collector.
  • Security and privacy
    • Timestamps are recorded in UTC.
    • We do not log plaintext passwords or MFA secrets; sensitive error details are not returned to clients.
    • File contents are never stored in audit logs; only metadata such as who, what, when, size, and status.

Tip: If you only need the steps to move files, see File uploads and File streaming.


Layer 2 — How it works in practice (User/Admin view)

  • For users
    • You can see receipts for your uploads and streams in the portal: when an action is started/completed, size, and destination, subject to your organization’s policies.
  • For administrators
    • Cloud‑hosted: organization audit data is retained by Stellarbridge and available on request. See Contact support.
    • Self‑hosted: audit entries are stored in your application database, and HTTP access logs are sent to stdout; use your tooling (backup, export, or ship to a log system) to retain and analyze them.
  • Exports
    • Cloud‑hosted: request a CSV/JSON export from support.
    • Self‑hosted: export from your database or forward stdout logs to your SIEM/log platform.
  • Retention
    • Cloud‑hosted: retention is managed by Stellarbridge according to our operational policy; contact support for current retention windows.
    • Self‑hosted: you control retention and backups at the database/log platform level.

Cloud API for organization events (cloud-hosted)

  • Endpoint: GET /api/v1/dashboard/organization/get-events-in-org
  • Authentication: requires a valid browser session with the JWT cookie named “stellarbridge”. Use an authenticated session, or programmatically authenticate first via the login endpoint to obtain the cookie.
  • Response: JSON payload in the form { “data”: [ event, … ] } where each event follows our LogWrapper structure (time, level, msg, and message{ timestamp, actor, action, target, result{ title, description, code }, remote{ ip, port }, sender{ file, email }, extra, org }).
  • Example (curl):
  • Notes: API rate limits apply by default (~30 requests per 15 seconds per client). Results can be large; paginate client-side by fetching periodically and storing checkpoints on your side.

Layer 3 — Administration and advanced options (Admin view)

What gets captured today

  • Authentication events: login success and failed login attempts, including timestamp and client IP.
  • Transfer receipts: completed upload and streaming actions with who initiated, target/destination, size, status, and timestamps.
  • Error signals: application errors are logged with structured fields (without leaking secrets) to aid investigation.

Access and governance

  • Use roles and permissions to limit who can view transfer receipts and administrative areas in the portal. See Permissions and RBAC.
  • For cloud‑hosted orgs, restrict who in your team is authorized to request exports from support.
  • For self‑hosted, restrict database access to trusted administrators; treat audit tables as sensitive data.

Recommended practices (self‑hosted)

  • Time synchronization: ensure your cluster nodes use NTP and log in UTC for consistent correlation.
  • Backups: include audit tables in your routine database backups.
  • Log shipping: forward stdout JSON logs from your Kubernetes pods or process manager to your SIEM (e.g., via Fluent Bit, Vector, or similar).
  • Least privilege: only grant audit database access to designated security/ops personnel.

Admin requirements by deployment

Admin action Self-hosted Cloud-hosted Notes
Enforce HTTPS/TLS at the edge Yes Managed Protects audit endpoints and portal access.
Decide audit log retention and backups Yes Managed DB retention and backups under your control if self‑hosted.
Control who can view receipts/exports Yes Yes Govern via roles and internal process.
Export or request audit logs Yes Yes Self‑hosted: export from DB/ship stdout; Cloud: use API (/api/v1/dashboard/organization/get-events-in-org) or request via support.
Time sync (NTP, UTC) across nodes Yes Managed Ensures consistent timestamps for correlation.
Monitor storage usage for audit data Yes Managed Prevents DB growth from impacting operations.

Troubleshooting

  • Missing login entries: confirm you are searching by UTC timestamps and the correct user email; check that the app can reach its database.
  • No stdout access logs: ensure your deployment collects container stdout/stderr and that rate limiting is not suppressing logs.
  • Gaps in transfer receipts: verify the transfer completed; drafts or aborted actions may not generate a completion record.

  • Security summary: Security at Stellarbridge
  • Architecture overview: Security architecture
  • Permissions and roles: Permissions and RBAC
  • File operations: File uploads, File streaming
  • Need help? Contact support