Skip to content

Commit 0b051ea

Browse files
addetzbenradstone
andauthored
Apply suggestions from code review
Co-authored-by: Ben Radstone <[email protected]>
1 parent 1b0feae commit 0b051ea

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

docs/docs-content/audit-logs/audit-logs.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -29,27 +29,27 @@ across all projects and tenant actions. The project scope audits show the activi
2929
- Users must have the **Tenant Admin** role or the `audit.get` and `audit.list` permissions at the tenant scope to
3030
access the audit logs.
3131

32-
3. Navigate to the left **Main Menu** and select **Audit Logs**.
32+
3. Navigate to the left main menu and select **Audit Logs**.
3333

3434
4. You can filter audit logs based on user and resource attributes. The following attributes can be used to filter the
3535
audit logs.
3636

37-
- **Project**
38-
- **Log Type**
39-
- **User**
40-
- **Resource Type**
37+
- **Project**
38+
- **Log Type**
39+
- **User**
40+
- **Resource Type**
4141

4242
5. You can also download audit logs as CSV files.
4343

4444
## Add Update Note
4545

46-
For certain resources like the cluster profiles, users can associate a custom update note in addition to the generic
47-
audit event log. On a successful save of the cluster profile, the user will be prompted to provide an update note about
48-
the changes made on the profile. This message will be shown when the user selects an audit log from the list.
46+
For certain resources, like cluster profiles, you can associate a custom update note in addition to the generic
47+
audit event log. On a successful save of a cluster profile, you will be prompted to provide an update note about
48+
the changes made to the profile. This message will be shown when you select an audit log from the list.
4949

5050
## Push Audit Trails to AWS CloudWatch
5151

52-
Spectro Cloud users can now push the compliance, management, operational, and risk audit logs to the
52+
You can push the compliance, management, operational, and risk audit logs to
5353
[AWS CloudWatch](https://aws.amazon.com/cloudwatch/). This enables continuous monitoring, security analysis, resource
5454
tracking, and troubleshooting of the workload cluster using the event history.
5555

@@ -81,7 +81,7 @@ Ensure that the IAM user or the ROOT user role created has the following IAM pol
8181

8282
1. Log in to [Palette](https://console.spectrocloud.com) as a tenant admin.
8383

84-
2. Navigate to the left **Main Menu** and select **Tenant Settings**. Then, select **Audit Trails** from the
84+
2. Navigate to the left main menu and select **Tenant Settings**. Then, select **Audit Trails** from the
8585
**Infrastructure** section.
8686

8787
3. Select **Add new Audit Trail**. The **Add audit trail** window appears.

0 commit comments

Comments
 (0)