Request Logs
Request Logs provide administrators with comprehensive auditing capabilities for both user tokens and system tokens, enabling real-time monitoring of API call behaviors, quick identification of abnormal access, and ensuring system security and compliance.
Token Identification
Token Type | Usage Scenario | Log Identifier |
---|---|---|
User Token | User API operations | User Token Name |
System Token | System-to-system calls | System Token Name |
Core Features
1. Multi-Condition Search
- Time Filter
- Combined Query Conditions
- Advanced Search
2. Multi-Dimensional Statistical Analysis
Analysis Dimension | Chart Type |
---|---|
API Type | Donut Chart |
Request Method | Donut Chart |
Status Code | Donut Chart |
Success Rate | Gauge Chart |
3. Detailed Request Display
- Basic Info
- Request Time
- Token Type
- Call Duration
- Client IP
- Request
- HTTP Method
- Request Headers
- Parameter List
- Request Body
- Response
- Status Code
- Response Headers
- Returned Data
- Error Details
Application Scenarios
1. Abnormal Access Analysis
Scenario: Detecting a large number of 401 status code requests
Actions:
- Filter authentication APIs with
success=false
- Analyze recent activities of associated tokens
- Identify compromised tokens and revoke them immediately
2. Performance Bottleneck Identification
Scenario: Sudden increase in API response time
Actions:
- Sort by call duration in descending order
- Correlate request parameters with response data
- Locate slow queries or resource contention issues
3. Compliance Audit Support
Scenario: Level 2.0 cybersecurity audit requirements
Actions:
- Export complete logs for the specified period
- Verify access records of sensitive APIs
- Generate token usage compliance reports