logo
PricingBlogDocs
Runops Docs
s3-storage
aws-secrets-manager
architecture
templates
enhanced-security
execution-review
manage-credentials
create-users
webhooks
pci-dds
soc2
self-host
runtime-information
github-integration
access-control
portal
directory-service
command-line
manage-users
multiple-agents
hashicorp-vault
secrets-manager
request-access
slack-automation
link-automations-connection
rich-automation-inputs
session-recording
proxy
templates-access-control
GDPR
collaborative-automations
security
kill-task
privacy-policy
faq
slack
portal
command-line
User Guides
12aws-ecs-exec
08python
11kubernetes-apply
09kubernetes
02postgres
Heroku
14rails-console-k8s
03mssql
13rails-console-ecs
15vault-cli
05shell
06node
index
sqlcl
04mongo
10kubernetes-exec
cqlsh
07elixir
01mysql
kubernetes
heroku-oneoff
ecs
index
heroku-rproxy
saas
eks
index
aws
authentication
endpoints
index
windows-powershell
troubleshooting
windows-docker
windows-wsl
macos
index
reuse-secrets
Runops Proxy
Runops Docs

session-recording

Session Recording

Auditing Proxy Connections

All commands performed in the connections are audited, as an administrator in Runops it’s possible to inspect which commands were issued:
shell
# it will peform a live audit, streaming the results in real time to the terminalrproxy audit -f# audit all commands executed in 22 of June of 2022rproxy audit -q datetime=2022-06-22
rich-automation-inputs
proxy

Powered by Notaku
Helpful?
Share
Content
session-recording
Session Recording
Auditing Proxy Connections