Governance & Security

Audit Logging

Monitor all data access, pipeline runs, and admin actions with NATIS audit logs.

5 min read · Updated March 2025

NATIS captures a comprehensive audit log of all user activities and system events. Audit logs are written to a dedicated Delta Lake table in your governance catalog and are available for querying, dashboarding, and export to SIEM systems.

Audit Log Schema

  • event_time — UTC timestamp of the event
  • user_email — Identity of the user who performed the action
  • service_name — NATIS service: SQL, Clusters, Pipelines, ModelServing, Admin
  • action_name — Specific action: runQuery, createTable, grantPrivilege, loginSuccess, etc.
  • request_params — JSON map of action parameters (e.g., query text, table name, cluster size)
  • response_status — SUCCESS, FAILURE, or PERMISSION_DENIED
  • source_ip_address — Client IP address
  • workspace_id — NATIS workspace identifier

Querying Audit Logs

Export audit logs to your SIEM (e.g., Splunk, Microsoft Sentinel) using the NATIS Log Export connector under Admin → Integrations → Audit Export. Supports real-time streaming via Kafka or hourly batch export to S3/Blob Storage.

SQL
-- Find all SQL queries by a specific user in the last 7 days
SELECT 
  event_time,
  user_email,
  request_params:commandText::STRING AS query_text,
  response_status
FROM governance.audit.system_logs
WHERE 
  service_name = 'SQL'
  AND action_name = 'runCommand'
  AND user_email = 'analyst@company.com'
  AND event_time >= CURRENT_TIMESTAMP - INTERVAL 7 DAYS
ORDER BY event_time DESC;

-- Find all failed permission checks
SELECT 
  event_time,
  user_email,
  service_name,
  action_name,
  request_params
FROM governance.audit.system_logs
WHERE response_status = 'PERMISSION_DENIED'
  AND event_time >= CURRENT_DATE - 1
ORDER BY event_time DESC;

Was this page helpful?

Thanks for your feedback!