This page describes how to use Lenses to enable auditing to track every action in Lenses.
Lenses audits all user actions. Audit events can be viewed in Lenses and also sent to two channels, Splunk and Webhook.
Audits can also written to a file by setting a file path in the lenses.audit.to.log.file option in lenses.conf. Lenses will then write audit entries to disk as JSON for collection by your log aggregation systems.
Go to Admin->Audits->Logs. Lenses will display the activity including, who performed the action and when. Details can also be viewed (dependent on the action).
To send audit logs to Splunk, you first need a Splunk connection. Go to Admin->Connection->New Connection and select Splunk.
Enter the connection details for your Splunk HTTP Event collector deployment.
Next, go to Admin->Audits->Channels->New Channel and select Splunk. Select a Splunk connection and set a Source
.
First, you need a Webhook connection. Go to Admin->Connections->New Connection
Enter the URL, port and credentials.
Create a Channel to use the connection. Go to Admin->Audits->Channels->New Channel and select Webhook
.
Choose a name for your Channel instance.
Select your connection.
Set the HTTP method to use.
Set the Request path. A URI-encoded request path, which may include a query string. Supports alert-variable interpolation.
Set the HTTP Headers
Set the Body payload
Lenses can also audit users' access to data and send events to multiple channels at the same time.
This page describes how to use Lenses to enable Kafka Quotas to ensure applications are well-behaved.
To view Kafka ACLs go to Admin->Kafka->Quotas. Lenses will list the Quotas.
To create a quota, click New Quota. Select the type of quota and enter the corresponding details. For example, for, type, CLIENT, set the producer and consumer rates.
To delete a quota, click the trash can for the quota.
This page describes how to use Lenses to apply Kafka ACLs for Kafka Clients.
Kafka ACLs are not linked to Lenses Authorisation.
To view Kafka ACLs go to Admin->Kafka->ACLS. Lenses will list the ACLs.
To create an ACL, click New ACL.
Click the trash can icon to delete an ACL.
This page describes how to use Lenses to create data policies to identify and mask data in Lenses as well as identify applications consuming them.
Data policies allow you to define data masking rules that redact data in Lenses based on field names. This applies to Kafka topics, Postgres tables and Elasticsearch indices.
Additionally, for each policy Lenses will identify not only the datasets involved but any application, e.g. SQL Processor or Connectors using this data.
To view data policies go to Workspaces->Policies.
If no policies are listed you can load the default policies that come built into Lenses.
To create a policy, click New Policy. Enter the details.
If you wish to have no masking but use the policies to identify datasets containing certain fields set the Redaction to NONE.
To edit a policy, select the policy and edit from the actions menu.
To delete a policy, select the policy and delete it from the actions menu.
This page describes how to use Lenses Self serivce and governance features for Kafka.
Lenses allows operators and users self-service operations across multiple resources. All actions are audited.
For automation use the CLI
.