Configure Access LogsPublic Preview
This guide covers the full lifecycle of access logs on Zilliz Cloud: enabling, adjusting settings, and disabling.
This release logs search- or query-class actions only: Search, HybridSearch, and Query. Support for the full action list is planned for a future release.
Audit log and access log are mutually exclusive in this release — only one can be enabled at a time.
Before you start
-
An object storage integration (AWS S3, Google Cloud Storage, or Azure Blob Storage) configured in the same region as your target cluster. For setup instructions, refer to Integrate with AWS S3, Integrate with Google Cloud Storage, or Integrate with Azure Blob Storage.
-
Organization Owner or Project Admin permissions for the project. If you do not have the required permissions, contact your Zilliz Cloud administrator.
Enable access logs
Open the Zilliz Cloud console and navigate to your target cluster.
On the cluster configuration page, click the Access Log tab, then click Enable.
In the Access Log Settings dialog box, configure the following settings:
-
Storage Integration: Select the integrated storage bucket where log files will be delivered.
-
Directory: Specify a directory within the bucket to store access logs.
-
Sampling Rate: Set the percentage of queries to log. A rate of 100% captures every operation. For high-volume workloads, a lower rate (such as 1%) reduces storage costs while preserving statistical significance.
-
Actions: Specify which operation types (for example, Search or HybridSearch) are recorded as access log entries.
-
Output Fields: Specify which metadata fields are included in each access log entry written to your object storage. Fields marked as Always included are recorded for every entry, while the selected fields are additionally captured.
Click Save. Log files begin appearing in your bucket within minutes, following the path convention /<Cluster ID>/Access/<Date>/<HH:MM:SS>-<UUID>.log.
Edit access log settings
You can adjust the sampling rate and output fields at any time without disabling access logs.