Get started with Jira Service Management for admins
Your first stop for learning how to get started with Jira Service Management.
This article highlights a new alerting feature that's natively available in Jira Service Management which is gradually rolling out to some Jira Service Management Cloud customers. It may not yet be visible or available on your site.
Audit logs are a summary of all the activities associated with an integration that help team admins troubleshoot issues.
Things to do before you start:
Make sure you’ve access to audit logs. Only organization admins, Jira admins, and team admins can view audit logs.
Launch operations for your team. Read how to launch operations for your team
To access and work with the audit logs for your team:
In Jira Service Management, go to Settings > Products.
Scroll to the Operations section and select Audit logs from the sidebar.
You’ll see a table of activities, organized by date and the time the activity happened. Expand a log entry to dig into the details. You can also copy the JSON version of the log for viewing. Some log entries may not include the details or the JSON content.
An audit log contains the following information:
IDs of and information about alerts, incidents, integrations
Time stamps, timezones
Details of action taken. For example, responder added, alert acknowledged, etc.
Integration properties
User profile information such as email, public name, full name, etc. as per the user’s profile visibility settings.
All the audit log information can be viewed by organization admins, Jira admins, and teams admins (as they have access to integrations' logs, including APIs and downloads).
Following is a detailed audit log entry in JSON format:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
{
"_internalDetails":
{
"incident-raw-id":"8b75f063-937c-4277-80d4-86d4b301ce27",
"incident-alert-type":"Associated"
},
"note":"null",
"snoozedUntil":"null",
"ownerFullName":"null",
"acknowledged":"false",
"isCustomAction":"false",
"integrationName":"Another sync",
"description":"",
"source":"xyz@mytest.com",
"_extraProperties":{
"incident-alert-type":"Associated"
},
"-oldTags":[],
"tinyId":"803",
"alias":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"action":"AddDetails",
"id":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"-customActions":[],
"owner":"",
"eventId":"b3dee76d-a50e-4f4a-b672-adbacadbf49e",
"_parsedData":{
"custom":"false",
"_oldAlert":{
"owner":"",
"_internalDetails":{
"incident-raw-id":"8b75f063-937c-4277-80d4-86d4b301ce27",
"incident-alert-type":"Associated"
},
"closedBy":"",
"acknowledged":"false",
"-actions":[],
"count":"1",
"acknowledgedBy":"",
"source":"xyz@mytest.com",
"_details":{"incident-alert-type":"Associated"
},
"message":"This is a high priority alert",
"priority":"P2",
"snoozed":"false",
"seen":"false",
"-responders":[],
"-tags":[],
"lastAcknowledgeTime":"0",
"entity":"",
"lastOccurredAt":"2023-06-30T22:30:25.746Z",
"status":"open",
"updatedAt":"1688164230672000070"
},
"_newAlert":{
"owner":"",
"_internalDetails":{
"incident-raw-id":"8b75f063-937c-4277-80d4-86d4b301ce27",
"incident-alert-type":"Associated"
},
"closedBy":"",
"acknowledged":"false",
"-actions":[],
"count":"1",
"acknowledgedBy":"",
"source":"xyz@mytest.com",
"_details":{
"incident-alert-type":"Associated"
},
"message":"This is a high priority alert",
"priority":"P2",
"snoozed":"false",
"seen":"false",
"-responders":[],
"-tags":[],
"lastAcknowledgeTime":"0",
"entity":"",
"lastOccurredAt":"2023-06-30T22:30:25.746Z",
"status":"open",
"updatedAt":"1688164230757318015"
},
"eventTime":"2023-06-30T22:30:30.764Z",
"action":"AddDetails",
"_source":{
"sourceType":"incident",
"domain":"incident",
"type":"request",
"configType":"incident"
},
"_customer":{
"cloudId":"336fac08-6a32-4272-86a4-8dd71505d33b",
"name":"jsmops.env",
"timeZone":"Europe/Sofia",
"id":"7471af39-b2fd-4296-a7f1-c51dd4a6bd85",
"locale":"en_US",
"activationId":"28467559-c62f-443d-9877-c4879fb7649b"
},
"_metadata":{
"createdAt":"2023-06-30T22:30:25.746Z",
"tinyId":"803",
"closeTime":"-1",
"alias":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"description":"",
"id":"5d3973e2-ebcd-4ef9-9cee-4ce0e2ee93e3-1688164225746",
"_integration":{"id":"0e0b127f-a89a-46eb-831a-b7c1bae17605",
"type":"API"
},
"ownerTeamId":"",
"-customActions":[]
},
"actionOwnerDisplay":"System",
"timestamp":"2023-06-30T22:30:30.764Z"
},
"-newlyAddedTags":[],
"oldPriority":"P2",
"integrationId":"6e422287-b320-4a37-90c7-44ba50f67ad5",
"_details":{
"incident-alert-type":"Associated"
},
"message":"This is a high priority alert",
"priority":"P2",
"_actionSource":{
"sourceType":"incident",
"domain":"incident",
"type":"request",
"configType":"incident"
},
"-responders":[],
"-tags":[],
"actionOwnerDisplay":"System",
"-removedTags":[],
"status":"open"
}
The audit log lists activities that go as far back as 180 days. You can search for specific integrations, alerts, notification rules, etc. in the search tab; and specify the time interval to search for.
In Jira Service Management, go to Settings > Products.
Scroll to the Operations section and select Audit logs from the sidebar.
Enter your search criteria in the text field. You can search for activities with specific keywords or by using the names of users, log category names, etc.
Narrow the search results by applying any number of filters:
Specify a date range, duration, log category, or log level.
Select Update.
Select Apply.
You can export the audit log to get it via email in CSV format.
In Jira Service Management, go to Settings > Products.
Scroll to the Operations section and select Audit logs from the sidebar.
Add filters if you wish to narrow down the logs you export to a specific criteria, and select Apply.
When you’re ready to export, select Export log.
You’ll get your exported log via email, this may take a while depending on the size of the exported logs.
Was this helpful?