Audit Trails

AuditVersionsChange TrackingCompliance

Audit Trails

Every change to a resource in Planton β€” a Cloud Resource deployment, a Service configuration update, a connection modification β€” is captured as an immutable version record. These records form a complete, append-only history of every resource in your organization.

This is not a simple log of "who clicked what." Each version record captures the full state of the resource before and after the change, a unified diff showing exactly what changed, who made the change, and whether the resulting deployment succeeded.

What Gets Captured

Each version record contains:

FieldWhat It Captures
New stateComplete YAML snapshot of the resource after the change
Original stateComplete YAML snapshot before the change (empty for the first version)
Unified diffGit-style diff showing additions, removals, and modifications with surrounding context
Event typeWhether the resource was created, updated, deleted, or restored
WhoThe identity account that initiated the change
WhenTimestamp of when the version was recorded
Stack Job linkFor infrastructure deployments, the Stack Job that executed the change
Stack Job statusWhether the deployment is queued, running, succeeded, or failed
Previous versionLink to the preceding version, forming a chronological chain

Infrastructure Manifest Diffs

For Cloud Resources, version records include an additional focused diff that isolates the infrastructure manifest from the surrounding platform metadata. This means you can see exactly what changed in the deployment definition (the VPC configuration, the database parameters, the cluster settings) without wading through platform bookkeeping fields.

The web console provides a tabbed view: Manifest shows only the infrastructure changes, Wrapper shows the full resource including platform metadata.

Immutability

Version records are append-only. Once a version is created, it cannot be modified or deleted. The only field that updates after creation is the Stack Job progress status β€” which tracks whether the deployment triggered by the change has succeeded or failed. The version content itself (states, diffs, identity, timestamps) is immutable.

This means the audit trail cannot be retroactively altered. If a resource was modified at 3:42 PM on Tuesday by user Alice, that fact is permanently recorded regardless of what happens afterward.

Viewing Audit Data

Versions List

Navigate to any resource's detail page in the web console and open the Versions tab. The versions list shows all recorded changes, newest first, with:

  • Version name (clickable β€” opens the diff view)
  • Who made the change (avatar and name)
  • Event type and timestamp
  • Stack Job progress icon (queued, running, succeeded, failed)
  • Version ID

Version Detail

Click any version to see the complete YAML representation of the resource at that point in time. This is the full snapshot β€” not a diff, but the entire resource state. Useful for understanding what a resource looked like at a specific moment.

Diff View

The diff view is the primary tool for understanding what changed between versions. It displays a unified diff showing additions (green), removals (red), and context lines.

Two display modes are available:

  • Line-by-line β€” Traditional unified diff format, one column
  • Side-by-side β€” Before and after shown in parallel columns

For Cloud Resources, vertical tabs switch between the Manifest diff (infrastructure definition only) and the Wrapper diff (full resource including platform metadata). The Manifest tab focuses your attention on the infrastructure changes that matter.

Access Control

Audit data is authorization-gated. You can only view version records for resources you have permission to see. If you have viewer access to an environment, you can view versions of all resources in that environment. If you only have access to a specific service, you can only view that service's version history.

This means the audit trail respects the same permission model as the rest of the platform. See Authentication and Authorization for how permissions are evaluated.

How Versions Are Created

Version records are created automatically. When a resource changes β€” through the web console, CLI, or API β€” the platform publishes an event. The audit system processes that event and creates the version record, including computing the diff and capturing the full state.

There is no manual step to "enable auditing" or "create a version." Every change to a versioned resource is captured. This ensures the audit trail is complete without depending on users or automation to remember to log changes.

Practical Uses

Debugging Failed Deployments

When an infrastructure deployment fails, the version record shows exactly what configuration change was attempted. The Stack Job link takes you to the deployment logs. Together, these answer the two critical debugging questions: "what changed?" and "what happened when we tried to apply it?"

Change Review

Before a deployment runs, the diff shows what will change. After it runs, the version record confirms what actually changed. This provides a complete audit chain for compliance reviews β€” every change has a recorded intention and result.

Rollback Investigation

Version records do not provide a rollback mechanism directly, but they provide the data needed to rollback manually. By viewing a previous version's full state, you can see exactly what the resource looked like before a problematic change and use that information to create a corrective update.

Compliance Reporting

The combination of immutable records, identity tracking, and timestamp logging provides the raw material for compliance audits. Every resource change is attributable to a specific user at a specific time, with full before-and-after state capture.

Next article

Teams and Access

Every Planton organization needs to answer three questions: who can access the platform, what can they do, and how do you manage that at scale? Teams and Access is where those answers live. As organizations grow, managing individual permissions becomes unsustainable. Adding a new engineer means manually granting access to each resource. Offboarding someone means tracking down every permission they were given. Auditing who has access to production means checking one person at a time. Planton...
Read next article

Β©2026 Planton Cloud Inc. All Rights Reserved.