mirror of
https://github.com/fosrl/docs-v2.git
synced 2026-02-07 21:46:42 +00:00
Add images
This commit is contained in:
BIN
images/access_logs.png
Normal file
BIN
images/access_logs.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 75 KiB |
BIN
images/action_logs.png
Normal file
BIN
images/action_logs.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 39 KiB |
BIN
images/request_logs.png
Normal file
BIN
images/request_logs.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 139 KiB |
@@ -17,6 +17,10 @@ Access logs capture authentication events when users or API keys attempt to acce
|
|||||||
- Understanding geographic distribution of access attempts
|
- Understanding geographic distribution of access attempts
|
||||||
- Analyzing user agent and device information
|
- Analyzing user agent and device information
|
||||||
|
|
||||||
|
<Frame>
|
||||||
|
<img src="/images/access_logs.png" centered/>
|
||||||
|
</Frame>
|
||||||
|
|
||||||
## Access Log Fields
|
## Access Log Fields
|
||||||
|
|
||||||
Each access log entry contains the following fields:
|
Each access log entry contains the following fields:
|
||||||
|
|||||||
@@ -17,6 +17,10 @@ Action logs capture administrative events and configuration changes performed by
|
|||||||
- Troubleshooting configuration issues by reviewing recent changes
|
- Troubleshooting configuration issues by reviewing recent changes
|
||||||
- Meeting security and compliance requirements
|
- Meeting security and compliance requirements
|
||||||
|
|
||||||
|
<Frame>
|
||||||
|
<img src="/images/action_logs.png" centered/>
|
||||||
|
</Frame>
|
||||||
|
|
||||||
## Action Log Fields
|
## Action Log Fields
|
||||||
|
|
||||||
Each action log entry contains the following fields:
|
Each action log entry contains the following fields:
|
||||||
|
|||||||
@@ -16,6 +16,10 @@ Request logs capture every HTTP request that passes through Pangolin's reverse p
|
|||||||
- Identifying potential security threats or unusual traffic patterns
|
- Identifying potential security threats or unusual traffic patterns
|
||||||
- Troubleshooting connectivity and routing issues
|
- Troubleshooting connectivity and routing issues
|
||||||
|
|
||||||
|
<Frame>
|
||||||
|
<img src="/images/request_logs.png"centered/>
|
||||||
|
</Frame>
|
||||||
|
|
||||||
## Request Log Fields
|
## Request Log Fields
|
||||||
|
|
||||||
Each request log entry contains the following fields:
|
Each request log entry contains the following fields:
|
||||||
|
|||||||
Reference in New Issue
Block a user