Forward Logs to Strata Logging Service
Focus
Focus
Identity

Forward Logs to Strata Logging Service

Table of Contents

Forward Logs to Strata Logging Service

Learn about forwarding logs to the Strata Logging Service using the Cloud Identity Engine.
The Cloud Identity Engine (CIE) supports automated log forwarding to the Strata Logging Service (SLS). With this integration, you’ll gain granular visibility into Directory Sync and Administrative Audit events; centralizing telemetry in SLS allows you to move beyond minimal service insights to efficiently troubleshoot synchronization errors, monitor real-time sync progress, and gather the evidence required for internal compliance audits.
This functionality includes the following:
  • Directory Synchronization Monitoring: Detailed tracking of the sync life cycle (full and incremental). This includes visibility into sync progress for large-scale directories and the ability to isolate failures to specific domains, forests, or trees.
  • Configuration Change Auditing: A definitive record of administrative actions. Audit logs specifically support changes made within the following UI sections:
    • Directory Sync: directories, agents & certificates, attributes.
    • Security Risk: risk connections, Cloud Dynamic Groups.
    • Authentication: CA chains, authentication types, authentication profiles.
Consider the following constraints:
  • Authentication (Auth) Logs: Log forwarding for end-user authentication events (visible in the Authentication Logs UI section) is not currently supported.
  • External forwarding: Exporting CIE logs from SLS to external SIEM systems (e.g., Splunk, Elastic) is not supported.
Troubleshooting Considerations
Forwarding CIE logs to SLS enables you to quickly troubleshoot errors and collect compliance evidence, allowing you to avoid delays in error remediation while ensuring that compliance requirements are met.
Directory Sync Troubleshooting
To troubleshoot directory synchronization, consider the following:
  • Sync Progress Tracking: Monitor the event_state sequence from SYNC_START to SYNC_IN_PROGRESS to verify that high-volume synchronization jobs are active.
  • Point-of-Failure Analysis: In the event of a SYNC_FAILURE, the failure_reason_code identifies the technical root cause, while the directory_id and directory_name isolate the specific forest or domain experiencing the issue.
  • Object Count Validation: Upon SYNC_SUCCESS, the count_summary JSON provides the final tally of users and groups processed, facilitating immediate reconciliation with the source directory.
Sync Logs
Attribute NameRaw Attribute NameExampleValuesDescription
CIE Time Receivedcie_log_time2025-12-18T05:16:02+00:00Time of the event in UTC when the sync operation occurred
Customer Idcustomer_id7701561416184349696Customer ID of the Cloud Identity Engine instance
Directory Iddirectory_id7a7d7ede-62f9-4f50-b1b7-0b6c38d5678bUnique identifier of the directory being synchronized
Directory Namedirectory_namedsscorp1.onmicrosoft.comName of the directory being synchronized
Directory Typedirectory_typeCLOUD DIRECTORY
ON-PREM DIRECTORY
CLOUD DIRECTORY
SCIM PROTOCOL
Type of directory being synchronized
Vendor Namevendor_nameENTRA_ID
MICROSOFT ACTIVE DIRECTORY
OPEN_LDAP
ENTRA_ID
OKTA
GOOGLE
Identity provider vendor supplying the directory data
Client Application Idclient_application_id2a509489-fba5-4674-b34f-d4dea7416f2dUnique identifier of the client application used for the directory sync operation
Sync Typesync_typeFULL_SYNC
FULL_SYNC
INCREMENTAL_SYNC
Type of synchronization performed - full synchronization or incremental (delta) synchronization
Sync Job Idsync_job_id152740840Unique identifier for the entire synchronization run
Event Sequence Idevent_sequence_id1Sequential number used to order events within a single sync_job_id for chronological event tracking
Event Categoryevent_categoryMEMBERSHIP_CHANGE
SYNC_START
SYNC_COMPLETE
RESOURCE_CHANGE
MEMBERSHIP_CHANGE
MEMBERSHIP_STATS
High-level category of the synchronization event (sync lifecycle)
Event Typeevent_typeMEMBER_ADDED
USER_ADDED
USER_REMOVED
USER_MODIFIED
GROUP_ADDED
GROUP_MODIFIED
GROUP_REMOVED
MEMBER_ADDED
GROUP_UPDATE_IN_PROGRESS
MEMBER_REMOVED
GROUP_MEMBERSHIP_STATS
Specific action or operation that occurred during the sync (detailed event subtype within event_category)
Event Stateevent_stateSYNC_IN_PROGRESS
SYNC_START
SYNC_IN_PROGRESS
SYNC_SUCCESS
SYNC_FAILURE
Current state or outcome of the synchronization job
Target Typetarget_typeGROUP
GROUP
USER
Object type of the entity being operated on or affected by the event
Target Idtarget_idGroup_AUnique identifier of the entity being operated on (e.g., Group ID or User ID referenced by the event)
Source Typesource_typeUSERUSERObject type of the source entity initiating or involved in the operation (e.g., User being added to a group)
Source Idsource_idUser_AUnique identifier of the source entity (e.g., User ID being added to or removed from a group)
Flattened Membership Count CIEflattened_membership_count_cie20Total number of flattened (recursive/transitive) users in this group during the active sync as calculated by CIE
Flattened Membership Count IDPflattened_membership_count_cie_previous_sync20Total number of flattened (recursive/transitive) users in this group from the last successful sync operation
Flattened Membership Count CIE Previous Syncflattened_membership_count_idp20Total number of flattened (recursive/transitive) users in this group as reported by the Identity Provider
Immediate Membership Count CIEimmediate_membership_count_cie20Total number of immediate (direct/non-recursive) users in this group during the active sync as calculated by CIE
Immediate Membership Count IDPimmediate_membership_count_cie_previous_sync20Total number of immediate (direct/non-recursive) users in this group from the last successful sync operation
Immediate Membership Count CIE Previous Syncimmediate_membership_count_idp20Total number of immediate (direct/non-recursive) users in this group as reported by the Identity Provider
Countcount20Number of objects impacted by this event
Count Summary- Usercount_summary.userTotal number of users in the directory at the end of the sync
Count Summary- Groupcount_summary.groupTotal number of groups in the directory at the end of the sync
Count Summary- Computercount_summary.computerTotal number of computers in the directory at the end of the sync
Count Summary- OUcount_summary.ouTotal number of OUs in the directory at the end of the sync
Count Summary- Containercount_summary.containerTotal number of containers in the directory at the end of the sync
Count Summary- Applicationcount_summary.applicationTotal number of applications in the directory at the end of the sync
Count Summary- RoleAssignmentscount_summary.roleassignmentsTotal number of role assignments in the directory at the end of the sync
Failure Reason Codefailure_reason_codeRoot cause of the job failure (only populated on SYNC_FAILURE).
Recommended Actionrecommended_actionInstruction for resolving the failure (only populated on SYNC_FAILURE).
TSG ID
Compliance Auditing
For compliance auditing, consider:
  • Administrative Accountability: Use event_source_user_email and event_description to audit which administrator modified settings in sections like CA Chains, Risk Connections, or Authentication Profiles, exactly what was changed, and when.
Audit Logs
Attribute NameData TypeExampleDescription
event_timeSTRING2025-11-13T00:13:45ZTime when the event happened. Example: 2025-11-13T00:13:45Z
event_category
CDUG_CREATED
CDUG_UPDATED
CDUG_DELETED
VAULT_ADDED
VAULT_DELETED
SECRET_ADDED
SECRET_MODIFIED
SECRET_SHARED
SECRET_UNSHARED
SECRET_DELETED
SECRET_RETRIEVED
CIE_LOGIN
DIRECTORY_ADDED
DIRECTORY_RECONNECTED
DIRECTORY_REMOVED
FULL_SYNC_TRIGGER_SUCCESSFUL
INCREMENTAL_SYNC_TRIGGER_SUCCESSFUL
FULL_SYNC_TRIGGER_UNSUCCESSFUL
INCREMENTAL_SYNC_TRIGGER_UNSUCCESSFUL
CIE_DIRECTORY_USER_ADDED
CIE_DIRECTORY_USER_REMOVED
CIE_DIRECTORY_USER_EDITED
RISK_CONNECTION_ADDED
RISK_CONNECTION_EDITED
RISK_CONNECTION_DELETED
AUTHENTICATION_TYPE_ADDED
AUTHENTICATION_TYPE_UPDATED
AUTHENTICATION_TYPE_DELETED
AUTHENTICATION_PROFILE_ADDED
AUTHENTICATION_PROFILE_UPDATED
AUTHENTICATION_PROFILE_DELETED
CA_CHAIN_ADDED
CA_CHAIN_UPDATED
CA_CHAIN_DELETED
Type of Event
event_description
A new CDUG is created on directory [domain]
CDUG [displayName], is updated on directory [domain]
CDUG [GUID], is deleted on directory [domain]
A new vault [name of vault] is created.
Vault [vaultID] is deleted.
A new secret [secretname], for [application name] [URL]] is added in vault
A secret [secretname] is updated, for [application name] [URL]]
A secret [id] is shared in the vault
Stopped sharing secret [secretid] in vault
A secret [id] is deleted from vault
Retrieved a secret [secretId] from vault
[admin] logged in to Cloud Identity Engine Application
A new [vendor] directory, [directory name], has been added
[vendor] directory, [directory name], has been reconnected
[vendor] directory, [directory name], has been deleted
A full synchronization for [vendor] directory, with ID [directory ID] has been manually initiated successfully
A incremental synchronization for [vendor] directory, with ID [directory ID] has been manually initiated successfully
Request for full synchronization for [vendor] directory, with ID [directory ID] is unsuccessful
Request for incremental synchronization for [vendor] directory, with ID [directory ID] is unsuccessful
New user(s), [user], has/have been added to CIE Directory [directory name]
User(s), [user] has/have been removed from CIE Directory [directoryId]
User, [user-id], has been editied in CIE Directory [directoryId]
A new [vendor] risk connection has been added
[vendor] risk connection has been edited
[vendor] risk connection has been deleted.
A new [AuthType] authentication type [Auth type name] has been added.
[AuthType] authentication type [Auth type name] has been updated.
[AuthType] authentication type [Auth type name] has been deleted.
A new [multi/single] authentication profile, [auth profile name], has been added.
[multi/single] authentication profile, [auth profile name], has been updated.
[multi/single] authentication profile, [auth profile name], has been deleted.
CA Chain [CA Chain Name] has been added.
CA Chain [CA Chain Name] has been deleted.
CA Chain [CA Chain Name] has been updated.
Detailed event summary

View CIE Logs Forwarded to Strata Logging Service

To leverage the benefits of automated CIE log forwarding to SLS, you’ll need to:
  1. Configure SLS. This process includes procuring the necessary license, activating the SLS, and performing onboarding tasks.
  2. Establish a storage quota. You set the Configure Quota and Audit log type within Strata Cloud Manager (SCM). This allows you to allocate the necessary space for the logs.
  3. Set the Retention Period. Numerous (often regulatory) guidelines determine the retention period.
To view CIE logs forwarded to Strata Logging Service (SLS):
  1. Log in the Palo Alto Networks Hub.
  2. Locate your tenant in the Tenants window. Once selected, the Strata Cloud Manager (SCM) page appears.
  3. In SCM, select Log Viewer in the navigation pane.
  4. In the Log Viewer screen, view Audit Logs by selecting Network/Firewall Traffic > Common > Audit.
  5. To view Sync Logs, select Directory Sync in the Cloud Identity Engine section.