Documentation Index
Fetch the complete documentation index at: https://docs.pangolin.net/llms.txt
Use this file to discover all available pages before exploring further.
Try free on Pangolin Cloud
Fastest way to get started with Pangolin using the hosted control plane. No credit card required.
Network logs are only available in Pangolin Cloud or self-hosted Enterprise Edition.
What are Network Logs?
Network logs capture tunnel sessions from clients to private resources. They are useful for:- Observing which clients and users opened sessions to which private resources
- Reviewing source and destination addresses and protocols (TCP and UDP)
- Measuring traffic volume with transmitted and received byte counts
- Auditing session start and end times for troubleshooting and compliance
Network Log Fields
Each network log entry contains the following fields:| Field | Type | Description |
|---|---|---|
timestamp | number | Unix timestamp (in seconds) when the session started |
protocol | string | Transport protocol for the session (tcp or udp) |
siteResourceId | number | null | The ID of the private resource for the session (if applicable) |
clientId | number | null | The Pangolin client ID for the session |
clientEndpoint | string | null | The client-side endpoint for the session (e.g. 123.123.123.123:12345) |
userId | string | null | The user ID when the session is tied to an authenticated user |
sourceAddr | string | Source address for the session (typically the client-side endpoint) |
destAddr | string | Destination address for the session (typically the resource-side endpoint) |
duration | number | null | How long the session lasted (in seconds), when the session has ended |
bytesTx | number | null | Bytes transmitted in the session |
bytesRx | number | null | Bytes received in the session |
Log Retention
Network log retention is controlled by the organization setting. By default, network logs are retained for 0 days (disabled).Network logs can generate significant data volume depending on session churn and traffic. Consider your storage capacity when configuring retention periods.

