Forward Logs to Strata Logging Service
Focus
Focus
Identity

Forward Logs to Strata Logging Service

Table of Contents

Forward Logs to Strata Logging Service

Learn about forwarding logs to the Strata Logging Service using the Cloud Identity Engine.
The Cloud Identity Engine (CIE) supports automated log forwarding to the Strata Logging Service (SLS). With this integration, you’ll gain granular visibility into Directory Sync and Administrative Audit events; centralizing telemetry in SLS allows you to move beyond minimal service insights to efficiently troubleshoot synchronization errors, monitor real-time sync progress, and gather the evidence required for internal compliance audits.
This functionality includes the following:
  • Directory Synchronization Monitoring: Detailed tracking of the sync life cycle (full and incremental). This includes visibility into sync progress for large-scale directories and the ability to isolate failures to specific domains, forests, or trees.
  • Configuration Change Auditing: A definitive record of administrative actions. Audit logs specifically support changes made within the following UI sections:
    • Directory Sync: directories, agents & certificates, attributes.
    • Security Risk: risk connections, Cloud Dynamic Groups.
    • Authentication: CA chains, authentication types, authentication profiles.
Consider the following constraints:
  • Authentication (Auth) Logs: Log forwarding for end-user authentication events (visible in the Authentication Logs UI section) is not currently supported.
  • External forwarding: Exporting CIE logs from SLS to external SIEM systems (e.g., Splunk, Elastic) is not supported.
Troubleshooting Considerations
Forwarding CIE logs to SLS enables you to quickly troubleshoot errors and collect compliance evidence, allowing you to avoid delays in error remediation while ensuring that compliance requirements are met.
Directory Sync Troubleshooting
To troubleshoot directory synchronization, consider the following:
  • Sync Progress Tracking: Monitor the event_state sequence from SYNC_START to SYNC_IN_PROGRESS to verify that high-volume synchronization jobs are active.
  • Point-of-Failure Analysis: In the event of a SYNC_FAILURE, the failure_reason_code identifies the technical root cause, while the directory_id and directory_name isolate the specific forest or domain experiencing the issue.
  • Object Count Validation: Upon SYNC_SUCCESS, the count_summary JSON provides the final tally of users and groups processed, facilitating immediate reconciliation with the source directory.
Sync Logs
Attribute NameData TypeExampleValuesDescriptionOptional Notes
cie_log_timeTIMESTAMP2025-12-18T05:16:02+00:00The precise time the event occurred (in UTC).No
customer_idSTRING7701561416184349696Customer's CIE Tenant IDNoSLS Common Field, Mandatory
directory_idSTRING7a7d7ede-62f9-4f50-b1b7-0b6c38d5678bDomain/Directory IdNo
directory_nameSTRINGdsscorp1.onmicrosoft.comDomain/Directory Name
directory_typeENUMCLOUD DIRECTORY
ON-PREM DIRECTORY
CLOUD DIRECTORY
SCIM PROTOCOL
Type of DirectoryNo
vendor_nameENUMENTRA_ID
MICROSOFT ACTIVE DIRECTORY
OPEN_LDAP
ENTRA_ID
OKTA
GOOGLE
NoSLS Common Field, Mandatory
client_application_idSTRING2a509489-fba5-4674-b34f-d4dea7416f2dID of the Client Application used for the sync operationYes
sync_typeENUMFULL_SYNC
FULL_SYNC
INCREMENTAL_SYNC
Indicates the sync type (Full vs. Incremental).No
sync_job_idSTRING152740840A unique ID for the entire sync runNo
event_sequence_idINTEGER1A sequence number to order events within a single sync_job_idNo
event_categoryENUMMEMBERSHIP_CHANGE
SYNC_START
SYNC_COMPLETE
RESOURCE_CHANGE
MEMBERSHIP_CHANGE
MEMBERSHIP_STATS
The broad type of eventNo
event_typeENUMMEMBER_ADDED
USER_ADDED
USER_REMOVED
USER_MODIFIED
GROUP_ADDED
GROUP_MODIFIED
GROUP_REMOVED
MEMBER_ADDED
GROUP_UPDATE_IN_PROGRESS
MEMBER_REMOVED
GROUP_MEMBERSHIP_STATS
The specific action that occurredNo
event_stateENUMSYNC_IN_PROGRESS
SYNC_START
SYNC_IN_PROGRESS
SYNC_SUCCESS
SYNC_FAILURE
Current state or outcome of the sync jobNo
target_typeENUMGROUP
GROUP
USER
The type of the related/affected entity (usually Group).No
target_idSTRINGGroup_AThe unique ID of the related/affected entity (e.g., Group's ID).No
source_typeENUMUSERUSERThe type of entity being acted upon (User, Group, etc.).Yes
source_idSTRINGUser_AThe unique ID of the entity being acted upon (e.g., User's ID).Yes
flattened_membership_count_cieINTEGER20
flattened_membership_count_cie_previous_syncINTEGER20
flattened_membership_count_idpINTEGER20
immediate_membership_count_cieINTEGER20
immediate_membership_count_cie_previous_syncINTEGER20
immediate_membership_count_idpINTEGER20
countINTEGER20Indicates the number of impacted objects
count_summaryJSON / Dictionary /
{
"application": 0,
"computer": 0,
"group": 0,
"user": 14259
}
JSON object containing total object counts (only populated on SYNC_SUCCESS).Yes
failure_reason_codeSTRINGRoot cause of the job failure (only populated on SYNC_FAILURE).Yes
recommended_actionSTRINGInstruction for resolving the failure (only populated on SYNC_FAILURE).Yes
log_typeDICT
{
"id": 8000,
"value": "audit"
}
Mandatory Field
sub_typeDICT
{
"id": 8000,
"value": "Default"
}
Mandatory Field
log_source_idSTRINGCLOUD_IDENTITY_ENGINEMandatory Field
log_source_group_idSTRINGCLOUD_IDENTITY_ENGINE - DIRECTORY_SYNC_SERVICEMandatory Field
log_sourceSTRINGCLOUD_IDENTITY_ENGINEMandatory Field
time_generatedINT1740603470Time when log is published. Example: 1762992825000 - It should be epoch value
time_generated_high_resINT1740603470668
tsg_idSTRING1673741556Customer's TSG Id
platform_typeSTRINGCLOUD_IDENTITY_ENGINEMandatory Field
Compliance Auditing
For compliance auditing, consider:
  • Administrative Accountability: Use event_source_user_email and event_description to audit which administrator modified settings in sections like CA Chains, Risk Connections, or Authentication Profiles, exactly what was changed, and when.
Audit Logs
Attribute NameData TypeExampleDescription
event_timeSTRING2025-11-13T00:13:45ZTime when event happened. Example: 2025-11-13T00:13:45Z
event_categorySTRING
USER_REMOVED_FROM_RISK_CATEGORY
RISK_SIGNAL_REMOVED_FROM_RISK_CATEGORY
RISK_SIGNAL_ADDED_TO_RISK_CATEGORY
RISK_CONNECTION_ADDED
CDUG_CREATED
VAULT_ADDED
VAULT_DELETED
SECRET_ADDED
SECRET_MODIFIED
SECRET_SHARED
SECRET_UNSHARED
SECRET_DELETED
SECRET_RETRIEVED
CIE_LOGIN
DIRECTORY_ADDED
DIRECTORY_RECONNECTED
DIRECTORY_REMOVED
FULL_SYNC_TRIGGER_SUCCESSFUL
INCREMENTAL_SYNC_TRIGGER_SUCCESSFUL
FULL_SYNC_TRIGGER_UNSUCCESSFUL
INCREMENTAL_SYNC_TRIGGER_UNSUCCESSFUL
CIE_DIRECTORY_USER_ADDED
CIE_DIRECTORY_USER_REMOVED
RISK_CONNECTION_ADDED
RISK_CONNECTION_EDITED
RISK_CONNECTION_DELETED
AUTHENTICATION_TYPE_ADDED
AUTHENTICATION_TYPE_UPDATED
AUTHENTICATION_TYPE_DELETED
AUTHENTICATION_PROFILE_ADDED
AUTHENTICATION_PROFILE_UPDATED
AUTHENTICATION_PROFILE_DELETED
CA_CHAIN_ADDED
CA_CHAIN_UPDATED
CA_CHAIN_DELETED
A high level view
event_descriptionSTRING
[admin] removed [user] from risk category [category]
[admin] removed [risk signal] from risk category [category]
[admin] added [risk signal] to risk category [category]
[admin] added a new risk connection [risk source]
[admin] created a new CDUG
[user] added a new vault [name of vault] and associated it with [directory]
[user] deleted vault [name of vault] which was associated with [directory]
[user] added a new secret for [application name] [URL]] in vault [vault name]
[user] changed the secret for an existing secret for [application name] [URL] in vault [vault name]
[user] shared a secret for [application name] [URL] in vault [vault name]
[user] stopped sharing a secret for [application name] [URL] in vault [vault name]
[user] deleted a secret for [application name] [URL] in vault [vault name]
[user] retrieved a secret for [application name] [URL] in vault [vault name]
[admin] logged in to Cloud Identity Engine Application
A new [vendor] directory, [directory name], has been added
[vendor] directory, [directory name], has been reconnected
[vendor] directory, [directory name], has been deleted
A full synchronization for [vendor] directory, [directory name], with ID [directory ID] has been manually initiated successfully
A incremental synchronization for [vendor] directory, [directory name], with ID [directory ID] has been manually initiated successfully
Request for full synchronization for [vendor] directory, [directory name], with ID [directory ID] is unsuccessful
Request for incremental synchronization for [vendor] directory, [directory name], with ID [directory ID] is unsuccessful
A new user, [user], has been added to CIE Directory [directory name]
User, [user], has been removed from CIE Directory [directory name]
A new [vendor] risk connection has been added
[vendor] risk connection has been edited
[vendor] risk connection has been deleted.
A new [SAML/OIDC/Client Certificate/Password Authentication] authentication type [Auth type name] has been added.
[SAML/OIDC/Client Certificate/Password Authentication] authentication type [Auth type name] has been updated.
[SAML/OIDC/Client Certificate/Password Authentication] authentication type [Auth type name] has been deleted.
A new [multi/single] authentication profile, [auth profile name], has been added.
[multi/single] authentication profile, [auth profile name], has been updated.
[multi/single] authentication profile, [auth profile name], has been deleted.
CA Chain [CA Chain Name] has been added.
CA Chain [CA Chain Name] has been deleted.
CA Chain [CA Chain Name] has been updated.
log_sourceSTRINGCLOUD_IDENTITY_ENGINEMandatory Field
log_source_idSTRINGCLOUD_IDENTITY_ENGINEMandatory Field
log_source_group_idSTRING
CLOUD_IDENTITY_ENGINE - DIRECTORY_SYNC_SERVICE
CLOUD_IDENTITY_ENGINE - CLOUD_AUTH_SERVICE
CLOUD_IDENTITY_ENGINE - SECRETS_VAULT
CLOUD_IDENTITY_ENGINE - USER_RISK_ENGINE"
Mandatory Field
time_generatedINT1740603470Time when log is published. Example: 1762992825000 - It should be epoch value
time_generated_high_resINT1740603470668
customer_idSTRING4711855380396736512CIE Tenant Id
tsg_idSTRING1673741556Customer's TSG Id
vendor_nameSTRINGPalo Alto NetworksMandatory Field
event_source_user_first_nameSTRINGJohn
event_source_user_last_nameSTRINGSmith
event_source_user_emailSTRINGjohn@paloaltonetworks.com
platform_typeSTRINGCLOUD_IDENTITY_ENGINEMandatory Field
log_typeDICT
{
"id": 8000,
"value": "audit"
}
Mandatory Field
sub_typeDICT
{
"id": 8000,
"value": "Default"
}
Mandatory Field

View CIE Logs Forwarded to Strata Logging Service

To leverage the benefits of automated CIE log forwarding to SLS, you’ll need to:
  1. Configure SLS. This process includes procuring the necessary license, activating the SLS, and performing onboarding tasks.
  2. Establish a storage quota. You set the Configure Quota and Audit log type within Strata Cloud Manager (SCM). This allows you to allocate the necessary space for the logs.
  3. Set the Retention Period. Numerous (often regulatory) guidelines determine the retention period.
To view CIE logs forwarded to Strata Logging Service (SLS):
  1. Log in the Palo Alto Networks Hub.
  2. Locate your tenant in the Tenants window. Once selected, the Strata Cloud Manager (SCM) page appears.
  3. In SCM, select Log Viewer in the navigation pane.
  4. In the Log Viewer screen, view Audit Logs by selecting Network/Firewall Traffic > Common > Audit.
  5. To view Sync Logs, select Directory Sync in the Cloud Identity Engine section.