Logs
The DX Cloud Logs section in the Cockpit displays logs for pods, domains, ingresses, and more. Each section has dedicated filtering by their relevant components as well as by a date range.
There are several different types of logs which are covered on this page. See the subsections below more for more details.
Select desired cluster
Select your desired cluster from the dropdown menu at the top of the Cockpit.
Magnolia Application logs
Magnolia Application logs display log entries from Kubernetes Pods running your Magnolia application and database instances.
Key information tracked
Magnolia Application logs capture operational events including:
-
Application tier logs: Java application events from Magnolia Author and Public instances
-
Database tier logs: PostgreSQL database operations and maintenance events
-
Error and warning tracking: Filter by log level (
FATAL,ERROR,WARN,INFO,DEBUG,TRACE) -
Deployment topology: Each log identifies its source namespace, pod, container, component, and tier
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
In addition to the guidance here, there is embedded help available directly in the Cockpit.
From Logs > Magnolia Application:
View from the Cockpit

-
First, select your desired cluster.
-
View the chart (histogram) to see log activity over time, including successful operations, warnings, and errors.
-
In the Filters section, you can update the following:
-
Date range: Use the calendar picker for a selected range or select one of the options (e.g., Last 15 minutes).
-
Namespaces: Enter namespace names to filter by specific deployment environments (e.g.,
staging,production). -
Pods: Enter pod names to filter by specific pod instances (e.g.,
staging-magnolia-helm-author-0). -
Containers: Enter container names to filter by specific containers (e.g.,
author-instance,author-db). -
Components: Filter by component type using checkboxes (
AUTHORorPUBLIC). -
Tiers: Filter by infrastructure tier using checkboxes (
APPfor application tier orDATABASEfor database tier). -
Levels: Filter by log severity level using checkboxes (
FATAL,ERROR,WARN,INFO,DEBUG,TRACE). -
Message filters: Enter free-text search terms to find logs containing specific keywords, error messages, or class names.
-
Details table
You can view log details in the Log Details table. Click Download logs (CSV) to download the logs locally. To view a specific log, click the log in the table. This triggers a detailed view of the log.
View from the Cockpit

| Column | Description | Example |
|---|---|---|
Level |
The severity level of the log entry. |
|
Date |
The timestamp when the log entry was created, in local time format. |
|
Class name |
The Java class that generated the log entry (for application logs) or LOG for database logs. |
|
Message |
The log message content, which may include error details, warnings, or informational messages. |
|
Namespace |
The Kubernetes namespace where the log was generated. |
|
Pod |
The Kubernetes pod that generated the log entry. |
|
Container |
The container within the pod that generated the log. |
|
Component |
The Magnolia component that generated the log (AUTHOR or PUBLIC). |
|
Tier |
The infrastructure tier that generated the log (APP for application or DATABASE for database). |
|
Magnolia Audit logs
Magnolia Audit logs track content operations performed within your Magnolia instances. These logs record all modifications to your JCR repository content, including creating, updating, moving, copying, and deleting nodes, helping you monitor editorial activity, investigate content changes, and maintain compliance.
Key information tracked
-
Actions: The operation performed (create, update, delete, move, copy)
-
Identity: Username performing the action
-
Content location: Workspace, node type, source path, and destination path
-
Component: Whether the action occurred on Author or Public instances
-
Infrastructure: Namespace, pod, and container where the operation was executed
-
Timestamp: Precise date and time when the action occurred
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
In addition to the guidance here, there is embedded help available directly in the Cockpit.
From Logs > Magnolia Audit:
View from the Cockpit

-
First, select your desired cluster.
-
View the chart (histogram) to see the content operation events over time.
-
In the Filters section, you can update the following:
-
Date range: Use the calendar picker for a selected range or select one of the options (e.g., Last 15 minutes).
-
Operations: Select one or more operation types to filter by (e.g., CREATE, UPDATE, DELETE, ACTION).
-
Usernames: Enter usernames to filter by (e.g.,
superuser,editor@example.com). -
Workspaces: Enter workspace names to filter by (e.g.,
website,dam). -
Node types: Enter node types to filter by (e.g.,
mgnl:page,mgnl:asset). -
Source paths: Enter source paths to filter by (e.g.,
/travel,/dam/images/*). -
Destination paths: Enter destination paths to filter by (e.g.,
/archive/*). -
Components: Filter by component type (AUTHOR or PUBLIC).
-
Namespaces: Enter namespaces to filter by specific deployment environments.
-
Pods: Enter pod names to filter by specific pod instances.
-
Containers: Enter container names to filter by specific containers.
-
Details table
You can view log details in the Log Details table. Click Download logs (CSV) to download the logs locally. To view a specific log, click the log in the table. This triggers a detailed view of the log.
View from the Cockpit

| Column | Description | Example |
|---|---|---|
Date |
The timestamp when the content operation was performed, in ISO 8601 format (UTC). |
|
Action |
The type of content operation performed on the JCR node. |
|
Username |
The username of the person who performed the action. |
|
Workspace |
The JCR workspace where the operation occurred. |
|
Node type |
The type of JCR node that was affected by the operation. |
|
Source path |
The original path of the node before the operation (relevant for MOVE and COPY operations). |
|
Destination path |
The target path of the node after the operation (relevant for MOVE and COPY operations). |
|
Component |
The Magnolia component where the operation occurred. |
|
Namespace |
The Kubernetes namespace where the operation was logged. |
|
Pod |
The Kubernetes pod that processed the operation. |
|
Container |
The container within the pod that handled the operation. |
|
Component |
The Magnolia component where the operation occurred. |
|
Magnolia Publication logs
Magnolia Publication logs provide detailed visibility into content publishing operations between your author and public instances. Use these logs to monitor publishing health, troubleshoot failed transfers, analyze publishing performance, and ensure content synchronization across your public instances.
Key information tracked
Publication logs capture operational events including:
-
Publishing operations: Each publish or unpublish action with the content path, workspace and target subscriber
-
Transaction status: Whether operations succeeded, were committed to the public instance, or required rollback due to errors
-
Performance metrics: Publishing time and subscriber response time
-
User attribution: Which user initiated each publishing action
-
Environment context: Component, namespace, pod, and subscriber service handling the operation
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
In addition to the guidance here, there is embedded help available directly in the Cockpit.
From Logs > Magnolia Publication:
View from the Cockpit

-
First, select your desired cluster.
-
View the chart (histogram) to see the content operation events over time.
-
In the Filters section, you can update the following:
-
Date range: Date range picker to specify the period
-
Namespace and pod: Namespace and pod to isolate specific deployment locations
-
Component: Author or Public instance
-
Content location: Workspace and path of the content published
-
User: Username of the person who initiated the publish action
-
Subscriber: Target public instance receiver
-
Message content: Free-text search to find logs containing specific keywords or error messages
-
Publishing size: Publishing size in bytes
-
Publishing time: Time it took to publish the content in milliseconds
-
Subscriber response time: Subscriber response time in milliseconds
-
Operation type: Whether the action was an unpublish (deactivation) operation
-
Transaction status: Whether the operation succeeded, was committed to the public instance, or required rollback due to errors
-
Details table
You can view log details in the Log Details table. Click Download logs (CSV) to download the logs locally. To view a specific log, click the log in the table. This triggers a detailed view of the log.
View from the Cockpit

| Column | Description | Example |
|---|---|---|
Date |
The timestamp when the log entry was created, in local time format. |
|
Name |
The name of the log entry. |
|
Pod |
The Kubernetes pod that generated the log entry. |
|
Component |
The Magnolia component that generated the log (AUTHOR or PUBLIC). |
|
Workspace |
The workspace of the published content. |
|
Path |
The path of the published content. |
|
Username |
The username of the person who initiated the publish action. |
|
Subscriber |
The target public instance receiver. |
|
Message |
The log message content, which may include error details, warnings, or informational messages. |
|
Publishing size |
The size of the published content in bytes. |
|
Publishing time |
The time it took to publish the content in milliseconds. |
|
Subscriber response time |
The time it took for the subscriber to receive the content in milliseconds. |
|
Unpublishing |
Whether the operation was an unpublish (deactivation) operation. |
|
Success |
Whether the operation succeeded. |
|
Committed |
Whether the operation was committed to the public instance. |
|
Rolledback |
Whether the operation was rolled back. |
|
Magnolia Frontend logs
Magnolia Frontend displays log information from Kubernetes Pods associated with the Magnolia frontend. You can access the pods logs by going to your Cockpit and navigating to the Logs section.
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
From Logs > Magnolia Frontend:
-
First, select your desired cluster.
-
Select your desired Release from the dropdown list.
-
Select your desired Frontend pod from the dropdown list.
-
Select your desired Frontend component from the dropdown list.
This is typically the public or author instance.
-
Select your desired Date Range.
-
Input any filter terms under Term. This filters the results by the term you’ve entered.
-
Click Apply filters.
Filter selection persists
CDN request logs
DX Cloud stores CDN request cache logs. The default setup and deployment stores customer IPs for a configurable amount of time. If you do not want customer IPs included in the logs at all, this is also something that can be configured.
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
In addition to the guidance here, there is embedded help available directly in the Cockpit.
From Logs > CDN requests:
View from the Cockpit

-
First, select your desired cluster.
-
View the chart (histogram) to see the logs such as Success (green), Client errors (yellow), and Server errors (red).
-
In the Filters section, you can update the following:
-
Date range: Use the calendar picker for a selected range or select one of the options (e.g., Last 15 minutes).
-
Method: Click one or many methods to filter by method (e.g., GET, POST, PUT, DELETE).
-
Protocol: Click one or many protocols to filter by (e.g., HTTP/1.1, HTTP/2, HTTP/3).
-
Hosts: Enter hosts to filter by (e.g.,
author.,public.). -
HTTP codes: Enter HTTP codes to filter by (e.g.,
401,404,500). -
Zones: Enter zones to filter by (e.g.,
FRA,NYC,SIN).[1] -
IPs: Enter an IP address to filter by (e.g.,
123.4.567.89). -
Paths: Enter a path to filter by (e.g.,
/.magnolia/admincentral/PUSH,/dam/*). -
Cache status: Enter a cache status to filter by (e.g.,
HIT,MISS,PASS,EXPIRED). -
RTT: Enter a Round-Trip Time (RTT)[2] with an operator (e.g.,
>100,<50) to filter logs by network latency. -
Size: Enter a response size in KB with an operator (e.g.,
>1000,<500) to filter by payload size. -
Request time: Enter a request processing time in milliseconds with an operator (e.g.,
>5000,<100) to filter by server response time. -
User agent: Enter a user agent string to filter by (e.g.,
Mozilla,Chrome,bot).
-
Details table
You can view log details in the Log Details table. Click Download logs (CSV) to download the logs locally. To view a specific log, click the log in the table. This triggers a detailed view of the log.
View from the Cockpit

| Column | Description | Example |
|---|---|---|
Date |
The timestamp when the request was received by the CDN, in ISO 8601 format (UTC). |
|
Method |
The HTTP method used for the request. |
|
Protocol |
The HTTP protocol version used for the request. |
|
Host |
The hostname or domain that received the request. |
|
HTTP code |
The HTTP status code returned in the response. |
|
Zone |
The CDN edge location code where the request was processed. |
|
IP |
The client IP address that originated the request. |
|
Path |
The URL path that was requested. |
|
Cache status |
Indicates whether the response was served from cache or passed through to the origin. |
|
RTT |
Round-Trip Time in milliseconds from the CDN edge to the origin server and back. |
|
Size [B] |
The response payload size in bytes. |
|
Request time |
The total request processing time in milliseconds. |
|
User agent |
The browser or client identification string that made the request. |
|
WAF logs
WAF logs displays log information from your Web Application Firewall rules. It only displays requests that have been blocked. You can access the WAF logs by going to your Cockpit and navigating to the Logs section.
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
From Logs > WAF:
View from the Cockpit

-
First, select your desired cluster.
-
Select your desired Domain name from the dropdown list.
-
Select your desired Date range.
-
If desired, enter a term to filter on.
-
Click Apply filters.
Filter selection persists
Ingress request logs
Ingress request logs displays log information from Kubernetes Ingresses. You can access the Ingress logs by going to your Cockpit and navigating to the Logs section.
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
In addition to the guidance here, there is embedded help available directly in the Cockpit.
From Logs > Ingress requests:
View from the Cockpit

-
First, select your desired cluster.
-
View the chart (histogram) to see the logs such as Success (green), Client errors (yellow), and Server errors (red).
-
In the Filters section, you can update the following:
-
Date range: Use the calendar picker for a selected range or select one of the options (e.g., Last 15 minutes).
-
Method: Click one or many methods to filter by method (e.g., GET, POST, PUT, DELETE).
-
Protocol: Click one or many protocols to filter by (e.g., HTTP/1.1, HTTP/2, HTTP/3).
-
Hosts: Enter hosts to filter by (e.g.,
author.,public.). -
HTTP codes: Enter HTTP codes to filter by (e.g.,
401,404,500). -
IPs: Enter an IP address to filter by (e.g.,
123.4.567.89). -
Paths: Enter a path to filter by (e.g.,
/.magnolia/admincentral/PUSH,/dam/*). -
Backend service: Enter a Kubernetes backend service name to filter by (e.g.,
magnolia-author-tomcat,magnolia-public-tomcat). -
Namespace: Enter a Kubernetes namespace to filter by (e.g.,
magnolia-prod,magnolia-staging). -
RTT: Enter a Round-Trip Time (RTT)[3] with an operator (e.g.,
>100,<50) to filter logs by network latency. -
Size: Enter a response size in KB with an operator (e.g.,
>1000,<500) to filter by payload size. -
Request time: Enter a request processing time in milliseconds with an operator (e.g.,
>5000,<100) to filter by server response time. -
User agent: Enter a user agent string to filter by (e.g.,
Mozilla,Chrome,bot). -
Request ID: Enter a unique request identifier to filter by (e.g.,
a1b2c3d4e5f6).
-
Details table
You can view log details in the Log Details table. Click Download logs (CSV) to download the logs locally. To view a specific log, click the log in the table. This triggers a detailed view of the log.
View from the Cockpit

| Column | Description | Example |
|---|---|---|
Date |
The timestamp when the request was received by the Ingress, in ISO 8601 format (UTC). |
|
Method |
The HTTP method used for the request. |
|
Protocol |
The HTTP protocol version used for the request. |
|
Host |
The hostname or domain that received the request. |
|
HTTP code |
The HTTP status code returned in the response. |
|
IP |
The client IP address that originated the request. |
|
Path |
The URL path that was requested. |
|
Backend service |
The Kubernetes service that handled the request. |
|
Namespace |
The Kubernetes namespace where the backend service resides. |
|
RTT |
Round-Trip Time in milliseconds from the Ingress to the backend service and back. |
|
Size [B] |
The response payload size in bytes. |
|
Request time |
The total request processing time in milliseconds. |
|
User agent |
The browser or client identification string that made the request. |
|
Request ID |
A unique identifier assigned to the request for tracking and correlation purposes. |
|
Enterprise search logs
DX Cloud stores Enterprise search logs. You can access the logs by going to your Cockpit and navigating to the Logs section. Enterprise search logs store a range of information from application errors to slow queries.
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
From Logs > Enterprise search:
-
First, select your desired cluster.
-
Select your desired Release from the dropdown list.
-
Select your desired Date range.
-
Click Apply filters.
Filter selection persists
| For more information on what you can see in these particular logs, see Solr logging. |
Redirect Application logs
Redirect Application logs capture internal service events from your redirect server, providing visibility into the redirect service’s operational health and behavior. Use these logs to monitor service startup, troubleshoot configuration issues, track rule loading, and identify errors in redirect processing.
Key information tracked
Redirect Application logs capture operational events including:
-
Log severity: Event level (
FATAL,ERROR,WARN,INFO,DEBUG,TRACE) indicating the importance of each log entry -
Message content: Details about redirect service operations, configuration loading, errors, or status updates
-
Environment context: Namespace and pod where the redirect service is running
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
In addition to the guidance here, there is embedded help available directly in the Cockpit.
From Logs > Redirect Application:
-
First, select your desired cluster.
-
View the chart (histogram) to see redirect service log activity over time.
-
In the Filters section, you can update the following:
-
Time range: Date range picker to specify the period
-
Infrastructure: Namespace and pod (limited to redirect service pods)
-
Log level:
FATAL,ERROR,WARN,INFO,DEBUG, orTRACEseverity levels -
Message content: Free-text search to find logs containing specific keywords or error messages
-
Details table
You can view log details in the Log Details table. Click Download logs (CSV) to download the logs locally. To view a specific log, click the log in the table. This triggers a detailed view of the log.
| Column | Description | Example |
|---|---|---|
Date range |
The timestamp when the log entry was created, in local time format. |
|
Namespace |
The Kubernetes namespace where the redirect service is running. |
|
Pod |
The Kubernetes pod that generated the log entry. |
|
Level |
The severity level of the log entry. |
|
Message |
The log message content, which may include status updates, configuration details, or error information. |
|
Redirect Request logs
Redirect Request logs capture HTTP requests processed by your redirect service, providing visibility into how URL redirections are being handled. Use these logs to analyze redirect traffic patterns, troubleshoot redirect rule issues, monitor response times, and identify misconfigured or missing redirects.
Key information tracked
Redirect Request logs capture operational events including:
-
Request details: HTTP method, protocol, host, path, and client IP address for each incoming request
-
Response metrics: HTTP status code (
301,302, etc.), response bytes, round-trip time (RTT), and request processing time -
Client information: Original client IP (via
X-Forwarded-Forheader), user agent, and request ID for distributed tracing -
Routing: Backend service that handled the request
-
Environment context: Namespace and pod where the redirect service processed the request
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
In addition to the guidance here, there is embedded help available directly in the Cockpit.
From Logs > Redirect Requests:
-
First, select your desired cluster.
-
View the chart (histogram) to see redirect request activity over time.
-
In the Filters section, you can update the following:
-
Time range: Date range picker to specify the period
-
Infrastructure: Namespace and pod (limited to redirect service pods)
-
Request details: Method (
GET,POST, etc.), protocol (HTTP/1.1,HTTP/2), host, and path -
Response: HTTP status codes (e.g.,
301,302,404,500) -
Client information: IP address,
X-Forwarded-For(original client IP), user agent, and request ID -
Routing: Backend service that handled the request
-
Performance thresholds: Request time with comparison operators
-
Details table
You can view log details in the Log Details table. Click Download logs (CSV) to download the logs locally. To view a specific log, click the log in the table. This triggers a detailed view of the log.
| Column | Description | Example |
|---|---|---|
Date |
The timestamp when the redirect request was received, in local time format. |
|
Namespace |
The Kubernetes namespace where the redirect service processed the request. |
|
X-Forwarded-For |
The original client IP address when requests pass through proxies or load balancers. |
|
Backend |
The backend service that handled the redirect request. |
|
Request ID |
The unique identifier assigned to the request for distributed tracing and correlation. |
|
Host |
The hostname or domain that received the request. |
|
HTTP code |
The HTTP status code returned (typically 301, 302, 307, or 308 for redirects). |
|
Method |
The HTTP method used for the request. |
|
Protocol |
The HTTP protocol version used for the request. |
|
IP |
The client IP address that originated the request. |
|
Path |
The URL path that was requested before redirection. |
|
User agent |
The browser or client identification string that made the request. |
|
Size |
The response payload size in bytes. |
|
Request time |
The total request processing time in milliseconds. |
|
Event logs
The Events section in the Cockpit displays information about the events within the cluster. These events are objects that show you exactly what is occurring inside your cluster, such as scheduler decisions or why some pods are being evicted from a node.
Generally, we keep logs for 30 days. However, for your deployment, you may configure a different duration.
|
You can select up to the last 7 days for this filter. |
Instructions
From Logs > Events:
View from the Cockpit

-
First, select your desired cluster.
-
Select the Start and End date range.
-
If desired, enter a term to filter on.
-
Click Apply filters.
Filter selection persists