Audit log

Check out this page to learn how Cast AI's Audit log tracks and displays detailed records of all operations, policy actions, and changes made in your cluster.

The Audit log provides a detailed view of all actions and events that occur within your cluster managed by Cast AI. This feature helps you track changes, troubleshoot issues, and maintain security compliance by recording both user-initiated actions and automated policy-driven changes.

How to access it

To view the Audit log:

  1. Navigate to your cluster in the Cast AI console
  2. Select Audit log from the left sidebar navigation menu

Understanding the interface

The Audit log displays information in a table format with the following columns:

  • Timestamp: When the action occurred
  • Operation name: Description of the action or event
  • Initiated by: Who or what triggered the action (user email or policy)

Each log entry can be expanded to view additional details about the operation:

For certain events, like unscheduled pods policy events, you can click on the instance type to view detailed information about:

  • Instance specifications
  • Node constraints
  • List of unscheduled pods that triggered the event
  • Resource requirements per pod

The entry summary can then be viewed as is in this table format, or you can switch to the YAML/JSON view by clicking the { } icon in the top right of the opened row:

Filtering capabilities

The Audit log provides powerful filtering options to help you find specific events:

Search filters

  • Text search: Enter keywords in the search bar to filter log entries
  • Time range: Select from preset time ranges (e.g., Last 24 hours) or specify a custom period
  • Initiated by: Filter by specific users or policies that triggered actions

Advanced search criteria

Use the following advanced filters to narrow down results:

  • Rebalance ID
  • Node ID
  • Node status
  • Policy applied
  • Node template
  • Node template version
  • Configuration version

Recent searches

The Audit log maintains a list of your recent searches for quick access to frequently used filters.

Types of tracked events

The Audit log tracks various events related to cluster operations, node management, and policy changes. Here's a complete list of events tracked by the system:

Event CategoryEvent TypeDescription
Policy ManagementPolicy enabledA policy has been activated in the cluster
Policy configurationChanges made to policy settings or parameters
Unschedulable pods policyEvents related to handling pending pods that need scheduling. Click the instance type in the event row to view detailed information about the unscheduled pods that triggered the event.
Node OperationsNode addedA new node has been added to the cluster
Node removedA node has been removed from the cluster
Node deletion requestedA request has been made to delete a node
Add node failedAn attempt to add a node to the cluster has failed
Nodes interruptedNodes have been interrupted (typically for Spot Instances)
Dead node deletedActions taken on nodes determined to be non-responsive
Cluster ManagementCluster createdA new cluster has been initialized
Cluster pausedCluster operations have been temporarily suspended
Cluster deletedA cluster has been permanently removed
Autoscaler executedThe cluster autoscaling mechanism has performed an action, the details of which are provided in the log
Rebalance plan changeModifications to the cluster's rebalancing strategy
Instance ManagementAddblacklist executedInstance types have been added to the blacklist
Spot Instance EventsSpot fallback enabledSpot Instance fallback mechanism has been activated
Spot fallback disabledSpot Instance fallback mechanism has been deactivated
Spot fallback updatedUpdates made to spot fallback settings
Spot node foundA suitable Spot Instance has been located
Failed to add nodesUnable to add Spot Instances
Failed to drain nodesUnable to safely remove workloads from spot nodes
Pod ManagementUnscheduled pods policyEvents related to handling pending pods that need scheduling

These events provide a comprehensive audit trail of all significant actions and changes within your cluster, enabling effective monitoring and troubleshooting of your Kubernetes environment.

Audit log retention and exporting

Audit logs are retained and accessible in the console for 90 days, after which they are archived (see Audit Log Retention Policy for details). However, if you need to analyze your audit logs externally or maintain them indefinitely, you can use our open-source Audit log exporter. This tool allows you to:

  • Export audit logs to your preferred storage solution
  • Perform custom analysis of historical data
  • Maintain audit logs beyond the retention period
  • Integrate audit data with your existing monitoring tools

To learn more about exporting your audit logs, visit our Audit log exporter documentation.