Using the connector
Once the connector is deployed, SCM audit logs are automatically fetched from Sectigo Certificate Manager and forwarded to Dynatrace at regular intervals — no manual action is required.
| For more details on working with logs in Dynatrace, refer to the official documentation: https://docs.dynatrace.com/docs/observe-and-explore/logs |
Verifying logs in Dynatrace
-
In Dynatrace, navigate to Observe & Explore > Logs.
-
Filter by
log.source = sectigo-scmto see only the SCM audit logs.Each log entry contains the following fields.
Parameter Description contentA human-readable summary in the format [service] action: details.
Example:
[scm] schedule: Notification sending has been scheduled for ID: 69809event.actionThe operation performed.
Examples:
schedule,webhook_notification_prepare,webhook_send_failureevent.serviceThe service that generated the event.
Examples:
scm,notification.processor,notification.senderevent.categoryThe category of the event (such as
ssl); may be empty for some records.event.idThe unique ID of the audit record.
object.typeThe type of resource affected (such as
scm.customer.notification.email); may be empty for some records.object.idThe ID of the affected resource; may be empty for some records.
customer.idThe customer ID associated with the event.
scm.event.typeThe SCM event type. Default is
LOG.statusThe outcome of the operation. Default is
SUCCESS.log.levelThe severity level, automatically determined based on the action type.
log.sourceAlways
sectigo-scm.