mirror of
https://github.com/rcourtman/Pulse.git
synced 2026-05-13 06:56:06 +00:00
1.5 KiB
1.5 KiB
Audit Log + Reporting Lifecycle
Objective
Validate audit logging and reporting enterprise features: audit event listing, export, summary, webhook configuration, notification webhooks, single/multi-resource report generation, and UI rendering.
Steps
Audit Logging
- Log in as admin.
- GET
/api/audit?limit=10— verify events list or 402 paywall. - GET
/api/audit/export?format=json— verify file download (or 501 for no logger). - GET
/api/audit/summary— verify summary statistics. - GET/POST
/api/admin/webhooks/audit— CRUD audit webhook URLs. - Navigate to
/settings/security-audit— verify audit log viewer renders.
Notification Webhooks (not license-gated)
- GET
/api/notifications/webhooks— list webhooks. - GET
/api/notifications/webhook-templates— verify templates available. - GET
/api/notifications/webhook-history— verify history available. - GET
/api/notifications/health— verify notification system health.
Reporting
- GET
/api/state— find a resource to report on. - GET
/api/admin/reports/generate?resourceType=node&resourceId=...&format=csv— generate report. - POST
/api/admin/reports/generate-multi— generate fleet report. - Navigate to
/operations/reporting— verify reporting page renders.
Expected Outcomes
- Audit events and exports work when
audit_loggingis licensed. - Reports generate when
advanced_reportingis licensed. - 402 paywall responses have correct format when not licensed.
- UI pages render relevant content or upgrade messaging.