Tip: Also see details about how to enable debug logging and setting up logging runtime in Jira and Confluence.
To enable audit logging, you will have to turn it on in your logging configuration. Both successful and failed Kerberos and SAML logins will be logged. For failed logins, there will be an additional sentence explaining why it failed. By adding the two lines, you will get logging in a similar pattern as the security logging in Jira (as Jira has the most precise logging of logins). This feature was added in version 3.5.15.
Logging will look like this:
This is done in Confluence by adding the following two lines below in the bottom of the file:
Log will be written to: atlassian-confluence.log
This is done in Jira by adding the following two lines below in the "# Security logs" section in the file:
Log will be written to: atlassian-jira-security.log
Similarly you may enable audit logging in other Atlassian products. Please contact us if you have problems setting this up and we will help you out.
Similarly you may enable diagnostics logging. Currently we only log detailed failures of Kerberos logins to this log. Log statements are written in standardized JSON format with keys "timestamp", "context" and "message" (the last containing several comma separated details form the fail) for easy analysis in log monitoring tools and look like this:
Diagnostics log must be enabled similarly to audit logging. Follow same way of setting up just replace 'com.kantegasso.AuditLog' with 'com.kantegasso.DiagnosticsLog' in the examples above. In addition to enable the Kerberos failures to be collected and sent to this log, you must press the 'Enable failure collection' button on Client failures found from the 'Usage counters' page:
This feature was added in version 3.6.13.