# Logs

You can access basically every log that the platform generates. Naturally, this means that you may not be able to understand everything which you can read. You don't have to. If you have any questions, [drop a message](https://www.radius-as-a-service.com/drop-a-question) and we're happy to answer them.

<figure><img src="https://1222554226-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FSWU1DQ4UGkqER7uGNUOm%2Fuploads%2F8BlwjA6zWdQ6cnvQvZGP%2F2024-05-13_12h16_21.gif?alt=media&#x26;token=c0280a28-f50b-44a1-accb-7ed5b930afea" alt=""><figcaption></figcaption></figure>

## Log types

Log types **not** mentioned in below table are less relevant for common trouble shooting scenarios.

| Log Type | Summary                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | Useful for ...                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              |
| -------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| `engine` | <p>Aggregated and correlated logs that provide key information on every authentication, e.g.</p><ul><li>Timestamp</li><li>Authentication duration</li><li>Identity of the supplicant</li><li>Credentials used (username/password, certificate)</li><li>Client authentication certificate used incl. verification type (<code>ocsp</code> or <code>crl</code>) and verification result (<code>valid</code> or <code>revoked</code>)</li><li>Authentication decision (<code>Accept</code> or <code>Reject</code>)</li><li>Error message (Rejects only)</li><li>Applied rule</li><li>MAC addresses (authenticator / supplicant)</li><li>Network type (<code>WiFi</code>, <code>LAN</code>, <code>VPN</code>)</li><li>SSID (for WiFi only)</li><li>AAA protocol used (<code>radius</code> or <code>radsec</code>)</li></ul> | <p>Most troubleshooting scenarios, e.g. debugging</p><ul><li><a href="../../../other/troubleshooting#unknown-ca">Trust issues</a></li><li><a href="../../../other/troubleshooting#fatal-decrypt-or-access-denied">Supplicant issues</a></li><li>Rule engine issues</li></ul>                                                                                                                                                                                                                                                                                |
| `proxy`  | Generated by the [RADIUS Proxies](https://docs.radiusaas.com/admin-portal/settings/settings-proxy) (in case at least one is configured)                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | <ul><li>Determination of the <a href="../../../other/faqs/general#how-can-i-identify-the-public-ip-address-pip-of-the-site-from-which-an-authentication-originates"><strong>public IP address of</strong> the authenticating <strong>sites</strong></a> (not applicable if RadSec is used)</li><li>Identifying <a href="../../../other/troubleshooting#wrong-shared-radius-secret"><strong>wrongly configured RADIUS shared secrets</strong></a></li></ul>                                                                                                  |
| `detail` | Comprehensive (raw) logs generated by the RadSec server(s). They include most EAP messages exchanged between supplicant and RADIUSaaS during authentication ("inner tunnel" messages).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | <ul><li>Debugging of issues that go beyond what can be debugged with the engine logs, e.g. checking if <strong>authentications</strong> are <strong>incomplete</strong> (Acess-Reject or Access-Accept missing for a particular authentication)</li><li><p>Troubleshooting issues with the <strong>RadSec connection</strong> - if used by your infrastructure</p><ul><li>Accessing the <strong>entire error message stack</strong> (found in Access-Reject messages) in case the error message parsed in the engine logs is ambiguous.</li></ul></li></ul> |
| `radsec` | Comprehensive (raw) logs generated by the RadSec server(s) related to the RadSec connection.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            | <ul><li>Troubleshooting RadSec connections issues, e.g. trust issues.</li><li>Identifying certificates presented by the authenticators when establishing RadSec connections.</li></ul>                                                                                                                                                                                                                                                                                                                                                                      |
