Commit 379ab4e9 authored by Mike Jang's avatar Mike Jang

Merge branch 'patch-250' into 'master'

Fix spacing, future tense and word abbreviation in documentation related to...

See merge request gitlab-org/gitlab!43678
parents 0eebf733 83221f8a
...@@ -9,7 +9,7 @@ info: To determine the technical writer assigned to the Stage/Group associated w ...@@ -9,7 +9,7 @@ info: To determine the technical writer assigned to the Stage/Group associated w
GitLab offers a way to view the changes made within the GitLab server for owners and administrators on a [paid plan](https://about.gitlab.com/pricing/). GitLab offers a way to view the changes made within the GitLab server for owners and administrators on a [paid plan](https://about.gitlab.com/pricing/).
GitLab system administrators can also take advantage of the logs located on the GitLab system administrators can also take advantage of the logs located on the
filesystem. See [the logs system documentation](logs.md) for more details. file system. See [the logs system documentation](logs.md) for more details.
## Overview ## Overview
...@@ -108,7 +108,7 @@ Server-wide audit logging introduces the ability to observe user actions across ...@@ -108,7 +108,7 @@ Server-wide audit logging introduces the ability to observe user actions across
the entire instance of your GitLab server, making it easy to understand who the entire instance of your GitLab server, making it easy to understand who
changed what and when for audit purposes. changed what and when for audit purposes.
To view the server-wide admin log, visit **Admin Area > Monitoring > Audit Log**. To view the server-wide administrator log, visit **Admin Area > Monitoring > Audit Log**.
In addition to the group and project events, the following user actions are also In addition to the group and project events, the following user actions are also
recorded: recorded:
...@@ -151,7 +151,7 @@ on adding these events into GitLab: ...@@ -151,7 +151,7 @@ on adding these events into GitLab:
The current architecture of audit events is not prepared to receive a very high amount of records. The current architecture of audit events is not prepared to receive a very high amount of records.
It may make the user interface for your project or audit logs very busy, and the disk space consumed by the It may make the user interface for your project or audit logs very busy, and the disk space consumed by the
`audit_events` PostgreSQL table will increase considerably. It's disabled by default `audit_events` PostgreSQL table may increase considerably. It's disabled by default
to prevent performance degradations on GitLab instances with very high Git write traffic. to prevent performance degradations on GitLab instances with very high Git write traffic.
In an upcoming release, Audit Logs for Git push events will be enabled In an upcoming release, Audit Logs for Git push events will be enabled
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment