The Audit Logs page is used to track important activities and events occurring within the system.
This section records every critical action so administrators can easily monitor
what changes or operations have been performed in the system.Audit logs are very important for security monitoring, troubleshooting, and activity tracking.
- Record actions performed within the system
- Monitor security-related events
- Track user activity
- Detect suspicious activity
- Assist with system troubleshooting and debugging
Each audit log entry stores several important pieces of information:- User – the user who performed the action
- Event – the action performed (for example: login, application update, variable change)
- IP Address – the IP address from which the request originated
- Time – when the event occurred
This information gives administrators full visibility into the activities happening within the system.
The Audit Logs page includes a search system that allows logs to be filtered easily.In the search box, you can search by:- User name
- Event description
- IP address
This makes it easy to quickly find specific activity even when there is a large number of logs.
If the logs grow too large or the system needs to be cleaned, an administrator can use the Clear Logs button.When this button is pressed:- A confirmation dialog appears
- After confirmation, all audit logs are deleted
This action is irreversible, so it should be used carefully.
In desktop view, logs are displayed in a table/list format with the following columns:Each row represents an individual system event.
On mobile devices, audit logs are displayed using a card layout, which improves readability on smaller screens.The card layout displays the following information:- User name
- Event description
- Date
- IP address
If there are a large number of logs, pagination is automatically enabled.Pagination allows you to view:- The current page of logs
- Total number of entries
- Previous and next page navigation
This helps maintain performance and keeps logs properly organized.
Audit logs are an important part of system security. They allow administrators to:- Detect unauthorized access
- Identify system misuse
- Investigate security incidents
- Verify user actions
For this reason, it is recommended to monitor audit logs regularly.Modified at 2026-03-05 11:57:44