Request and download logs
Aura allows you to request and download security and query logs.
You can access logs from an Aura instance via the Logs tab.
To access the Logs tab:
-
Navigate to the Neo4j Aura Console in your browser.
-
Select the instance you want to export the logs from.
-
Select the Logs tab.
Query logs
A query log provides a log of queries executed on an instance within a specified time range.
Queries that complete successfully within 50 ms are not logged. |
Requesting query logs
To request a query log from the Logs tab:
-
Click Request log.
-
Select the Query Log option under Type.
-
Select a Range option.
-
Click Request.
Requested logs will appear for up to 7 days, at which point they will expire and be removed. |
You can select from the following time ranges when requesting a query log:
-
Last 15 minutes
-
Last hour
-
Custom range - Any range up to one hour from the previous 30 days
We recommend shorter time ranges for busy, read/write heavy instances to reduce request time. |
Aura will generate a query log for your selected time range, available to download once the Status shows Completed.
Downloading query logs
You can download query logs by selecting the download icon on the right-hand side of the log entry.
Downloaded query logs take the form of a zipped JSON file that, when extracted, contains the following information:
Name | Description |
---|---|
|
The number of bytes allocated by the query. |
|
The metadata attached to the transaction. |
|
The name of the user who executed the query (whose credentials were used to log in). |
|
The name of the database the query was executed on. |
|
The ID of the instance the query was executed on. |
|
The time the query took to complete in milliseconds. |
|
The query event:
|
|
The name of the user who executed the query either through authentication ( |
|
The ID of the query. |
|
The log message: a truncated version of |
|
The number of page faults resulting from the query. |
|
The number of page hits resulting from the query. |
|
The full query text. |
|
The Cypher runtime used to execute the query. |
|
The type of log message. |
|
The timestamp of the log message. |
Security logs
AuraDB Virtual Dedicated Cloud AuraDS Enterprise
A security log provides a log of all the security events that have occurred on an instance within a specified time range.
Security events include:
-
Login attempts: both successful and unsuccessful.
-
Authorization failures from role-based access control.
-
Administration commands run against the
system
database.
Requesting security logs
To request a security log from the Logs tab:
-
Click Request log.
-
Select the Security Log option under Type.
-
Select a Range option.
-
Click Request.
Requested logs will appear for up to 7 days, at which point they will expire and be removed. |
You can select from the following time ranges when requesting a security log:
-
Last 6 hours
-
Last 12 hours
-
Custom range - Any range up to 12 hours from the previous 30 days
Aura will generate a security log for your selected time range, available to download once the Status shows Completed.
Downloading security logs
You can download security logs by selecting the download icon on the right-hand side of the log entry.
Downloaded security logs take the form of a zipped JSON file that, when extracted, contains the following information:
Name | Description |
---|---|
|
The name of the user who executed the security event (whose credentials were used to log in). |
|
The ID of the instance the security event occurred on. |
|
The name of the user who executed the security event either through authentication ( |
|
The log message. |
|
The type of log message. |
|
The timestamp of the log message. |