Skip to content

Audit trail

Complete action history with before/after change tracking

Cased CD Enterprise provides a comprehensive audit trail that records all actions taken in the system.

Every action in Cased CD is logged with:

  • Who — Username and user ID
  • What — Action type and affected resource
  • When — Timestamp with timezone
  • Where — Source IP address
  • Details — Before/after state for changes
CategoryEvents
AuthenticationLogin attempts, logout, SSO flows, token refresh
ApplicationsCreate, update, delete, sync, rollback, resource actions
ClustersAdd, update, remove clusters
RepositoriesAdd, update, remove repositories
ProjectsCreate, update, delete projects
RBACRole changes, permission updates
SettingsConfiguration changes

Navigate to SettingsAudit Trail in Cased CD to:

  • Browse all events chronologically
  • Filter by user, action type, or resource
  • View detailed before/after diffs
  • Export events for compliance

Audit events are stored in a PersistentVolumeClaim:

# Default configuration
enterprise:
persistence:
enabled: true
size: 10Gi
storageClass: "" # Uses cluster default
EventsApproximate storage
1 million~500 MB
10 million~5 GB
20 million~10 GB (default)
Terminal window
helm upgrade cased-cd cased/cased-cd-enterprise \
--namespace argocd \
--set 'imagePullSecrets[0].name=cased-cd-registry' \
--set enterprise.persistence.size=50Gi \
--set enterprise.persistence.storageClass=fast-ssd

For clusters without persistent storage support, disable the audit PVC:

Terminal window
helm upgrade cased-cd cased/cased-cd-enterprise \
--namespace argocd \
--set 'imagePullSecrets[0].name=cased-cd-registry' \
--set enterprise.auditTrail.enabled=false

Audit events are written as JSON lines:

{
"timestamp": "2024-01-15T10:30:00Z",
"user": "alice@example.com",
"action": "sync",
"resource": "application",
"resourceName": "frontend",
"project": "default",
"sourceIP": "10.0.1.50",
"success": true,
"details": {
"revision": "abc123",
"prune": false
}
}

Audit events are retained indefinitely within the storage allocation. To manage retention:

  1. Increase storage — Scale the PVC for longer retention
  2. Export old events — Use the export feature before cleanup
  3. Log aggregation — Forward to external systems for long-term storage

The audit trail helps meet compliance requirements for:

  • SOC 2 — Access logging and change tracking
  • HIPAA — Activity audit controls
  • PCI DSS — Audit trail requirements
  • ISO 27001 — Information security event logging

Audit events logged to stdout can be collected by standard logging agents:

[INPUT]
Name tail
Path /var/log/containers/cased-cd-enterprise*.log
Parser json
[OUTPUT]
Name elasticsearch
Host elasticsearch.logging.svc
Index cased-cd-audit

With the CloudWatch agent installed, logs are automatically forwarded to CloudWatch Logs.

scrape_configs:
- job_name: cased-cd-audit
kubernetes_sd_configs:
- role: pod
relabel_configs:
- source_labels: [__meta_kubernetes_pod_label_app_kubernetes_io_name]
regex: cased-cd-enterprise
action: keep