mirror of
https://github.com/amidaware/tacticalrmm.git
synced 2026-04-26 06:55:52 +03:00
[GH-ISSUE #2122] Feature Request: Tactical RMM Audit Log to File in /var/log #3263
Labels
No labels
In Process
bug
bug
dev-triage
documentation
duplicate
enhancement
fixed
good first issue
help wanted
integration
invalid
pull-request
question
requires agent update
security
ui tweak
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/tacticalrmm#3263
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @redanthrax on GitHub (Jan 21, 2025).
Original GitHub issue: https://github.com/amidaware/tacticalrmm/issues/2122
Originally assigned to: @wh1te909 on GitHub.
Is your feature request related to a problem? Please describe.
I need a way to scrape the audit log and store it externally.
Describe the solution you'd like
I would like the tacticalrmm audit log to log to a file in or a directory in /var/log and end with a .log extension.
Describe alternatives you've considered
Scheduling a script to pull the audit log data from the db and place the data in /var/log.
Additional context
The purpose is to scrape the data with promtail.
@wulfsystems commented on GitHub (Jul 23, 2025):
from my POV its an important featurerequest.
I for example want to check the tactical logs by splunk.
@eastedentech commented on GitHub (Jan 20, 2026):
Yeah, I would like to push those logs to something like Wazuh or similar.
Or just be able to add a syslog destination so TRMM can just send the logs direct to a syslog ingestion point.
@bensen1 commented on GitHub (Jan 26, 2026):
Would be highly appreciated by us too! ; )