Skip to content

Request Logs

Request Logs provide administrators with comprehensive auditing capabilities for both user tokens and system tokens, enabling real-time monitoring of API call behaviors, quick identification of abnormal access, and ensuring system security and compliance.

Token Identification

Token TypeUsage ScenarioLog Identifier
User TokenUser API operationsUser Token Name
System TokenSystem-to-system callsSystem Token Name

Core Features

  • Time Filter
  • Combined Query Conditions
  • Advanced Search

2. Multi-Dimensional Statistical Analysis

Analysis DimensionChart Type
API TypeDonut Chart
Request MethodDonut Chart
Status CodeDonut Chart
Success RateGauge Chart

3. Detailed Request Display

  • Basic Info
    • Request Time
    • Token Type
    • Call Duration
    • Client IP
  • Request
    • HTTP Method
    • Request Headers
    • Parameter List
    • Request Body
  • Response
    • Status Code
    • Response Headers
    • Returned Data
    • Error Details

Application Scenarios

1. Abnormal Access Analysis

Scenario: Detecting a large number of 401 status code requests
Actions:

  1. Filter authentication APIs with success=false
  2. Analyze recent activities of associated tokens
  3. Identify compromised tokens and revoke them immediately

2. Performance Bottleneck Identification

Scenario: Sudden increase in API response time
Actions:

  1. Sort by call duration in descending order
  2. Correlate request parameters with response data
  3. Locate slow queries or resource contention issues

3. Compliance Audit Support

Scenario: Level 2.0 cybersecurity audit requirements
Actions:

  1. Export complete logs for the specified period
  2. Verify access records of sensitive APIs
  3. Generate token usage compliance reports

Released under the GPL-3.0 License.