Skip to main content

elasticsearch audit support for guillotina

Project description

Guillotina_audit: ElasticSearch Logging for Audit Trail in Guillotina Framework

Aim of the package?

The main purpose of this package is to enable auditing and monitoring of changes made to Guillotina objects. By integrating Elasticsearch as the logging backend, it allows for efficient indexing and searching of the audit logs.

When an object is created, modified, or deleted within the Guillotina system, the guillotina_audit package captures relevant information about the event, such as the object ID, the timestamp of the action, the type of action (create, update, delete), and any additional relevant data.

This information is then sent to Elasticsearch, which stores it in a structured format. Elasticsearch provides powerful search capabilities, allowing you to query and analyze the audit logs based on various criteria, such as object ID, timestamps, action types, and more.

By logging changes and events in Elasticsearch, guillotina_audit facilitates monitoring and tracking of object activities in the Guillotina system. It helps in ensuring data integrity, tracking user actions, investigating issues, and maintaining a historical record of object modifications.

The package provides an essential auditing layer for transparency and accountability, helping users gain insights into the changes happening within the Guillotina system and enabling effective monitoring and analysis of object-level activities.

Installation

pip install guillotina-audit

Configuration

config.yaml can include elasticsearch section. Add this to your guillotina config file

audit:
  index_name: "audit"
  connection_settings:
    hosts:
      - "http://127.0.0.1:9200"
    sniffer_timeout: 0.5
    sniff_on_start: true

Installation on a site

Guillotina_audit comes as an addon for guillotina. To install it in your site:

“POST”, “/db/guillotina/@addons”, data=json.dumps({“id”: “audit”})

Uninstall on a site

“DELETE”, “/db/guillotina/@addons”, data=json.dumps({“id”: “audit”})

Uninstalling will not delete the log entries created in ES.

2.0.1 (2024-03-05)

  • Being able to decode dates and datetimes when indexing custom payloads from events.

2.0.0 (2024-01-23)

  • Supporting ES version 7 and 8

  • By default the async elasticsearch version is 8.12

1.0.6 (2023-12-19)

  • Changing date by datetime in models.

  • Fixing creation_date was not indexed when login wildcards

1.0.5 (2023-12-12)

  • Adding log_entry method to the utility. Now customized documents can be indexed

1.0.4 (2023-11-16)

  • Changing requirement of guillotina

1.0.3 (2023-11-16)

  • Adding try except clause in subscribers

1.0.2 (2023-11-15)

  • Adding save_payload parameter in the settings of the utility

1.0.1 (2023-11-15)

  • Solving bugs

1.0.0 (2023-11-15)

  • Initial release [nilbacardit26]

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

guillotina_audit-2.0.1.tar.gz (22.4 kB view details)

Uploaded Source

File details

Details for the file guillotina_audit-2.0.1.tar.gz.

File metadata

  • Download URL: guillotina_audit-2.0.1.tar.gz
  • Upload date:
  • Size: 22.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.0

File hashes

Hashes for guillotina_audit-2.0.1.tar.gz
Algorithm Hash digest
SHA256 aa49e862cab333ff742dfbfcfa4d400c8ab8196c1ba58698a86f6f35338d210e
MD5 b9d4696156af77004720ec566e2102a0
BLAKE2b-256 acf4971f2262788df1f8bcb9d8d0be1880ccc158fcb86e5178162eaa1535f6da

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page