Skip to content

Activity Log

The Activity Log (Settings โ†’ Activity Log) provides an audit trail of configuration and operational changes within your company's Wallarm account, including the actor, timestamp, affected resource, and source of each action.

Activity log

Use the Activity Log to investigate configuration changes (e.g. find out who disabled a rule or removed an IP from the denylist), support compliance audits (SOC 2, PCI DSS, etc.), and troubleshoot issues caused by recent modifications.

By default, the log displays data for the last 3 months.

What you can see

Each Activity Log entry includes:

Column Description
Time Date and time of the action.
Object type Category of the resource that was affected (e.g. Rule, Integration, Node).
Object Name and ID of the specific resource that was modified.
Action What was done: Create, Update, Delete, or Mode change.
Outcome Whether the action succeeded or failed.
Actor Who performed the action โ€” a user, a node, or Technical support (see Actors).
Source How the action was triggered (see Action sources).
Changes List of fields that were modified in this action.

Click any row to open a detail drawer showing the full diff between the Previous and New state, with changed values highlighted.

Activity log - details of activity

Use the link button in the drawer to copy a direct URL to a specific event.

Object types

The Object type filter and column show what kind of Wallarm resource was affected. The table below lists all available object types:

Object type What it means
Client Changes to tenant account settings โ€” name, status, or configuration.
User User account changes โ€” role assignments, profile updates, enabling or disabling accounts. See Managing Users.
Sign-in User sign-in events โ€” successful and failed authentication attempts.
Subscription Changes to your Wallarm subscription plan โ€” plan upgrades, renewals, or expiration date modifications.
Application Changes to protected application definitions โ€” adding, renaming, or removing applications.
Invitation Email invitations sent to new users or revoked.
Integration Changes to third-party integrations โ€” Slack, email, SIEM connectors, webhooks, etc.
API token API token creation, permission changes, regeneration, or revocation.
Node Filtering node registration, updates, or removal. When you see many Create entries with the Node source, these are nodes auto-registering in the Cloud.
Node token Node token lifecycle events โ€” creation, regeneration, or revocation.
Security Edge Changes to Security Edge configuration and deployment settings.
Trigger Changes to triggers โ€” automated reactions to events like new attacks or hits exceeding thresholds.
Sampling Changes to hit sampling configuration that controls how much attack data is stored.
Extreme sampling Changes to extreme sampling settings applied under high-load conditions.
Rule Creating, modifying, or deleting individual traffic processing rules.
API spec Uploads or updates to API specifications used for endpoint validation.
API spec policy Changes to policies that enforce API specification compliance.
Session export config Changes to API Sessions export configuration โ€” defines which session context parameters are exported from the filtering node to the Wallarm Cloud for session analysis.
Rule migration Events related to copying the full ruleset between tenant accounts.
Rule settings Changes to global rules engine configuration, such as ruleset build parameters.
Attack Marking detected attacks as false positives.
2FA Two-factor authentication enabled or disabled for a user account.
IP list object Changes to IP list entries โ€” adding or removing IPs, subnets, countries, or other sources in the denylist, graylist, or allowlist.
LDAP settings Changes to LDAP directory authentication configuration.
SAML authentication Changes to SAML SSO identity provider settings and provisioning rules.
Email integration Changes to email report integration settings - scheduled PDF reports and instant security event notifications.

Action types

The Action filter lets you narrow results by what was done:

Action Description
Create A new resource was added.
Update An existing resource was modified.
Delete A resource was removed.
Mode change Hit sampling was enabled or disabled.

Actors

The Actor column identifies who performed the action. Depending on the source, the actor can be:

  • A user from your account's user list โ€” displayed as the user's name and numeric ID.

  • A filtering node โ€” when the action source is Node, the Actor column shows the node's numeric ID instead of a user name. This is typical for automated operations such as node self-registration in the Cloud.

  • Technical support โ€” displayed when the action was performed by the Wallarm support team.

Action sources

The Source column indicates how the action was triggered:

Source Description
UI Action performed manually in Wallarm Console.
API token Action performed programmatically via the Wallarm API using an API token.
Node Action performed automatically by a Wallarm filtering node.
Unknown Source could not be determined (e.g. system-level operations).

Access restrictions

The Activity Log respects user role permissions. You will only see entries for resources and actions that your role has access to.

For example, if your role does not grant access to rule management, rule-related activity will not appear in your log.

Exporting data

Click Export CSV at the top right to download the currently displayed log entries (respecting all active filters) as a CSV file.

Export is useful for compliance audits (SOC 2, ISO 27001), incident post-mortems, or sharing activity data with teams that do not have Wallarm Console access. Since Wallarm retains Activity Log data for a limited period, consider exporting regularly to your own storage (SIEM, data lake, or archive) if your retention policy requires longer history.