# Serilog The next section allows us to set the Infoport logging. [![Snímek obrazovky 2024-04-23 144643.png](https://doc.eainfoport.cz/uploads/images/gallery/2024-04/scaled-1680-/snimek-obrazovky-2024-04-23-144643.png)](https://doc.eainfoport.cz/uploads/images/gallery/2024-04/snimek-obrazovky-2024-04-23-144643.png) The first item is a check box that says whether user activities should be logged. (List of visited URLs). [![insighs.png](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/scaled-1680-/insighs.png)](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/insighs.png) In the second item, we choose the relative path for saving logs. [![Log path.png](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/scaled-1680-/log-path.png)](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/log-path.png) In the third item, we select the type of logging. (Each type is described in the table. We recommend Information logging.) [![logtype.png](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/scaled-1680-/logtype.png)](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/logtype.png) Table for logging types.
**Level (from the most detailed to the least detailed)** **Description**
Verbose For information that's typically valuable only for debugging. These messages may contain sensitive application data and so shouldn't be enabled in a production environment. Disabled by default.
Debug For information that may be useful in development and debugging. Example: Entering method Configure with flag set to true. Enable Debug level logs in production only when troubleshooting, due to the high volume of logs.
Information For tracking the general flow of the app. These logs typically have some long-term value. Example:Request received for path/api/todo
Warning For abnormal or unexpected events in the app flow. These may include errors or other conditions that don´t cause the app to stop but might need to be investigadet. Handled exceptions are a common place to use the Warning log level. Example: FileNotFoundException for file quotes.txt.
Error For errors and exceptions that cannot be handled. These messages indicate a failure in the current aktivity or operation (such as the current http request), not an app-wide failure. Example log message: Cannot insert record due to duplicate key violation.
Fatal For failures that require immediate attention. Examples: data loss scenarios, out of disk space.
In the fourth item, we select where we want the logs to be written. We have three options: Console, File or Both. [![service log write to.png](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/scaled-1680-/service-log-write-to.png)](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/service-log-write-to.png) In the fifth item, we choose how often the log file should be closed. [![rollinginterval.png](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/scaled-1680-/rollinginterval.png)](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/rollinginterval.png) Here we can see the chosen day. This means that a new log file is created for the portal every day. Logs from previous days remain on disk. [![image-1749473080529.png](https://doc.eainfoport.cz/uploads/images/gallery/2025-06/scaled-1680-/image-1749473080529.png)](https://doc.eainfoport.cz/uploads/images/gallery/2025-06/image-1749473080529.png) #### Audit for login/logout The "/Account/Login" and "/Account/Logout" events are logged, both successful (StatusCode == 302) and unsuccessful ones. Audit for Enterprise Architect Database modifications Logs changes that users make to repository data. Adding, editing and deleting Packages, Element, Diagram, Attribute, Operation, etc. #### Audit for HTTP status codes Failed/unauthorized accesses are logged, specifically "403 Forbidden for user ...", "404 NotFound for user ...", "401 Unauthorized for user ...". These events mainly occur when manually modifying (spoofing) a url, when the id or guid of an artifact that the user cannot access is replaced. #### Audit for Infoport permissions Both approved and denied accesses are logged. These are always calculated for the requested Package and separately for personal and group permissions. Warning: there may be a large number of these entries in the log. In addition, changes to user and group permissions made by administrators are also logged. From these logs, it is possible to see who has assigned or removed what permissions when. #### Audit for Access Keys Creation or deletion of an access key is logged so that it can be determined who ever created the key, which is then used for direct access (where no explicit user logging is required) After filling in, just press the [![check.png](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/scaled-1680-/check.png)](https://doc.eainfoport.cz/uploads/images/gallery/2022-03/check.png) button and the manager will tell you if everything is OK.