Tokens in LogScale

LogScale supports a variety of different tokens that are used to provide API access to the different components of the system. Tokens use a randomly generated sequence of characters that identify the authority of a system or service to use a particular aspect of the LogScale instance. Below is a list of them, with descriptions of each:

  • Ingest Tokens

    Ingest tokens are long-living token strings that you can use to set up your ingestion pipeline in Falcon LogScale Collector or other log shippers. Ingest tokens are used to identify the repository, parser and authority to send data for ingestion into LogScale. They do not allow access to the API or to query repositories.

    For more information, see Ingest Tokens.

  • Personal API Tokens

    Used to access the APIs within LogScale, Personal API tokens inherit the permissions of their user.

  • Organization API tokens

    Organization level tokens provide access to actions within an organization, including creating users and repositories.

  • Repository and view API tokens

    API tokens at the repository and view level enable API-level access for reading data, managing the repository, packages, triggers and integrations. API tokens are limited to a single view within the UI but can be created through the GraphQL API to cover multiple views and repositories.

Each API token, with the exception of Ingest and Personal API tokens, is configured with the following parameters:

  • API Token name

    The name of the token used to identify the token.

  • API Token domain

    There are specific API tokens for different areas of LogScale functionality, including system-level administration, organization level administration, views and repositories.

  • Permissions

    Depending on the domain, API tokens will have one or more permissions which can be explicitly granted. These only apply to the generated API token, and limit the ability of the token to that functionality. For more information on permissions, see Repository & View Permissions.

  • IP Filter

    An IP filter can be applied to limit incoming connections to specific IP addresses or networks.

  • Expiry

    A token can be configured to automatically expire on a set time and date.

API tokens are governed by Security Policies for IP filters.