All Products
Search
Document Center

Secure Access Service Edge:Log analysis

Last Updated:Mar 31, 2026

Log analysis collects and stores logs from devices accessing Secure Access Service Edge (SASE). Built on Alibaba Cloud Simple Log Service (SLS), it supports query analysis, statistical charts, and alerting—so you can investigate access activity without manually organizing raw data.

This topic explains how to enable log storage, collect logs, run queries, and view data reports.

Prerequisites

The log storage service for SASE is enabled.

Enable the log storage service

Log storage is a paid service that must be activated before you can collect or query logs.

  1. Log on to the SASE console.

  2. In the left navigation pane, choose Log Analysis > Log Analysis.

  3. On the Log Analysis page, click Activate Now.

  4. Set the log storage service and log storage capacity based on your requirements, click Buy Now, and complete the payment.

After activation, SLS automatically creates a dedicated project for SASE. To view it, go to the Project list on the home page of the Simple Log Service console.

Enable log collection and storage

After the log storage service is active, turn on log collection for your SASE deployment.

  1. Log on to the SASE console.

  2. In the left navigation pane, choose Log Analysis > Log Analysis.

  3. In the upper-right corner of the Log Analysis page, click Log Status to enable log collection and storage.

image

Supported log types

SASE can collect and store the following log types:

  • Private access log

  • PA sensitive file audit log

  • Accelerate log

  • Client logon log

  • Client status log

  • DLP log

  • Internet access log

  • Dynamic decision log

Query logs

Select a log type and enable log delivery

  1. In the upper-left corner of the Log Analysis page, click the drop-down list and select the log type you want to view. Filter the results by specifying conditions as needed.

  2. Click the switch next to a log type to enable or disable log delivery for that type.

image

Run a query

  1. Enter a search statement in the search box and set a time range.

image

A query analysis statement combines a search statement and an analytic statement, separated by a vertical bar (|):

<Search statement> | <Analytic statement>
Statement typeRequiredDescription
Search statementYesThe filter condition. Accepts keywords, fuzzy queries, numeric values, numeric ranges, or combinations. Leave blank or enter * to return all data in the selected time range. For more information, see Query syntax and features.
Analytic statementNoComputes or aggregates query results. If omitted, only the matching log entries are returned without statistical analysis. You can omit the from log clause that standard SQL requires. By default, the first 100 entries are returned. Use the LIMIT clause to change this limit. For more information, see Query and analysis overview.
  1. Click Search & Analyze to run the query and view results.

Results appear as a log distribution histogram and Raw Logs. From the results page, you can also set alerts, create saved searches, refresh, and share. For more information, see Description of the Query/Analysis page.

Common query examples

The following examples use the AND operator to filter logs by type and condition. All examples return up to 10,000 results, grouped and sorted by count.

SASE client online status

Before running these queries, manually add an index for the app_status field. For more information, see Create an index.

Query online devices:

* AND log_type : client_status_log | select username,app_status,COUNT(*) AS cn GROUP BY username,app_status order by cn desc limit 10000

Query offline devices:

* AND log_type : client_status_log AND app_status:offline | select username,app_status,COUNT(*) AS cn GROUP BY username,app_status order by cn desc limit 10000

SASE client logon

Query logon actions by user and device:

* AND log_type : client_logon_log | select username,action,COUNT(*) AS cn GROUP BY username,action order by cn desc limit 10000

Intranet access

Query devices and users accessing the intranet:

* AND log_type : pa_access_log | select username,device_type,COUNT(*) AS cn GROUP BY username,device_type order by cn desc limit 10000

Query blocked access attempts and the reasons:

* AND log_type : pa_access_log AND action:block | select username,block_info,COUNT(*) AS cn GROUP BY username,block_info order by cn desc limit 10000

Sensitive file detection

Query how many times each sensitive file policy was matched:

* AND log_type : dlp_log | select username,matched_policy,COUNT(*) AS cn GROUP BY username,matched_policy order by cn desc limit 10000

View data reports

Data reports are available for Internet access log only.

  1. From the drop-down list, select Internet access log, then click the Data Report tab.

image
  1. On the Data Report tab, explore the log data:

    • Time Range: Select a time range in the upper-right corner to filter report data.

    • Drill Down: Click image in the upper-right corner of the report. In the Drill Down dialog box, view data from different data sources.

image

Log field reference

Identity and account fields

Field nameDescriptionExample
__time__Operation time.2018-02-27 11:58:15
aliuidAlibaba Cloud account ID.141681795035****
usernameName of the enterprise employee.John Doe
departmentDepartment of the enterprise employee.Test Department

Device fields

Field nameDescriptionExample
device_typeDevice type. Valid values: Windows, macOS, Linux, Android, iOS.Windows
device_tagUnique ID of the device.ccabaebc-77b3-a877-23f1-31b89b59****
app_statusDevice status. Valid values: Online, Offline.Online

Access and traffic fields

Field nameDescriptionExample
actionAction applied to the request. The valid values depend on the log type:<br>- Intranet access logs: allow (access permitted by policy), block (access denied by policy)<br>- Client logon logs: logon (device logged on), logout (device logged out), exit (SASE client closed)block
domainDomain name accessed on the intranet.www.aliyundoc.com
dst_addrDestination address for intranet access.10.2.XX.XX
dst_portDestination port for intranet access.80
src_addrSource address for intranet access.10.4.XX.XX
src_portSource port for intranet access.30001
in_bytesInbound traffic volume, in bytes.234
out_bytesOutbound traffic volume, in bytes.567
protocolNetwork protocol. Valid values: All, tcp, udp.tcp
request_uriRequest URI./test.php

Policy and log type fields

Field nameDescriptionExample
log_typeLog type. Valid values: pa_access_log (intranet access log), client_logon_log (client logon log), dlp_log (log of detected sensitive file exfiltration), client_status_log (client status log).pa_access_log
policy_nameName of the policy that matched.test

Timestamp fields

Field nameDescriptionExample
event_timeTime when the event occurred, as a Unix timestamp in seconds.1675278754
unixtimeTime when the event was recorded, as a Unix timestamp in seconds.1675278754