Field | Description |
---|---|
date | Timestamp when this event occurred. |
log_id | The id of the log event |
type | The log event type |
description | The description of the event. |
connection | The connection name related to the event. |
connection_id | The connection id related to the event. |
client_id | The client id related to the event |
client_name | The name of the client related to the event. |
ip | The IP address from where the request that caused the log event originated. |
user_agent | The user agent that is related to the event. |
details | An object containing further information for this log event. |
user_id | The user id related to the event. |
user_name | The user name related to the event. |
strategy | The connection strategy related to the event. |
strategy_type | The connection strategy type related to the event. |
type:"fu"
description:"missing username parameter"
description:"Wrong email or password"
type:"limit_wc"
type:"pwd_leak"
type:"s" AND ip:"99.xxx.xxx.xxx"
user_id
: user_id:"auth0|ABC123"
client_name
or client_id
log event fields to see which applications were accessed. Make a note of when access occurred.type:"sapi"