Inventory Audit log
Summary
The technical design is aimed to address the need of catalogers to track the history of changes for different entities in FOLIO. The solution uses the common approach for auditable events in FOLIO similar to the audit of events in circulation and acquisition domains.
Requirements
Functional Requirements
https://folio-org.atlassian.net/browse/UXPROD-4125
https://folio-org.atlassian.net/browse/UXPROD-4126
NFR
UXPROD-4125/UXPROD-4126 NFR Scorecard
Assumptions
For ECS environments: Shared entities' version history should be tracked only in the central tenant.
All changes in the system related to inventory entities (instances, items, holdings, bibs) generate Domain events.
Domain events related to update action have old and new versions of the entity
Baseline Architecture
In existing architecture, mod-inventory-storage
is responsible for persisting such entities as instances, holdings, and items. mod-entities-links
is responsible for authorities. Both modules produce domain events on create/update/delete actions from different sources.
Target Architecture
The existing architecture allows the reuse of the capabilities of the domain events approach to persist audit log events.
Audit Consumers Sequence Diagram
Solution Summary
The process is split into two main parts
1. Persistence: There are storage options that can be implemented.
Option | Description | Pros & Cons | |
---|---|---|---|
1 | RDBMS | The audit database should persist a diff of the entity. The queries are made mostly by the entity's unique identifier. Thus partitioning by UUID and subpartitioning by date ranges can be applied to audit tables | Pros:
Cons:
|
2 | Object Storage | AWS S3-like storage can be used to persist diffs because audit events can be stored as plain-text (JSON) documents | Pros:
Cons:
|
2. Version history display: This should be done on demand comparing each diff of the entity to the previous
3. Changes to be tracked:
Changes in entity fields
Changes related to an update of the parent entity, e.g. holding update cascades to updates in items’ effective shelving order
Changes in metadata should be ignored
Key implementation aspects:
The Kafka default delivery semantics is “AT_LEAST_ONCE”. Ensure that domain events have their unique identifiers to be able to handle consuming messages in an idempotent manner
Add new consumers in
mod-audit
to inventory domain events for instances, items, and holdings.Add new consumers in
mod-audit
to authority domain events for authorities.Add new consumers in
mod-audit
to source record domain events for marc-bib records.(see: Source Record Domain Eventing)mod-audit
should support the following configurations on the tenant level:Retention period in years (with default value - 0 for indefinite retention)
Feature flag to enable audit capability. In case when the audit is disabled no consumers and logs should be persisted.
Anonymizing flag that indicates whether the records in the database should be anonymized before persistence to the database (To be confirmed).
mod-audit
should have the following scheduled jobs:Daily: to remove records that exceed the retention period
Monthly: to create subpartitions for audit tables
Persist audit events in an event storage. A table in DB per entity type with partitioning by UUID (hash) and subpartitioning by date range.
Create REST API
4. to provide information on a list of changes related to a particular entity
5. to provide detailed information on the particular change - this API should use the Object diff library to return a verbose description of the changes related to the entity
ERD
With data size implications, creating separate tables per each entity type is required. The default table structure is listed below:
Column | Type | required | unique | Description | |
---|---|---|---|---|---|
1 | EventID | UUID | y | y | unique event identifier |
2 | EventDate | timestamp | y | n | date when the event appeared in the event log |
3 | Origin | varchar | y | n | Origin of the event: data-import, batch-update, user, etc. |
4 | Action | varchar | y | n | what action was performed |
5 | ActionDate | timestamp | y | n | when action was performed |
6 | EntityID | UUID | y | n | entity identifier |
7 | UserId | UUID | y | n | user who did the action, fixed UUID for anonymized user |
8 | Diff | jsonb | y | n | Difference between “old” and “new” body of the entity |
WBS
Title | Description | Module | Link | |
---|---|---|---|---|
1 | [Instance (FOLIO) Audit] Extend domain event with source FOLIO | Create/Update/Delete operations in the module should generate related events with the new/old body for the entity
| mod-invenotry-storage | |
2 | [Item Audit] Extend domain event with source FOLIO | Create/Update/Delete operations in the module should generate related events with the new/old body for the entity
| mod-invenotry-storage | |
3 | [Holding Audit] Extend domain event with source FOLIO | Create/Update/Delete operations in the module should generate related events with the new/old body for the entity
| mod-invenotry-storage | |
4 | [Instance (MARC) Audit] Extend domain event with source MARC | Create/Update/Delete operations in the module should generate related events with the new/old body for the entity
| mod-source-record-storage | |
5 | [Authority Audit] Extend domain event for Authority | Create/Update/Delete operations in the module should generate related events with the new/old body for the entity
| mod-entities-links | |
6 | [Instance(FOLIO) Audit] Consume domain event | To allow efficient access to the data in the audit table it is required to:
| mod-audit | |
7 | [Instance(MARC) Audit] Consume domain event | To allow efficient access to the data in the audit table it is required to:
| mod-audit | |
8 | [Holding Audit] Consume domain event | To allow efficient access to the data in the audit table it is required to:
| mod-audit | |
9 | [Item Audit] Consume domain event | To allow efficient access to the data in the audit table it is required to:
| mod-audit | |
10 | [Authority Audit] Consume domain event | To allow efficient access to the data in the audit table it is required to:
| mod-audit | |
11 | [Instance/Item/Holding/Bib Audit] Configuration | Provide configuration parameter to enable/disable audit log on tenant level
| mod-audit | |
12 | [Instance/Item/Holding/Bib Audit] Configuration | Anonymize events
| mod-audit | |
13 | [Instance/Item/Holding/Bib Audit] Configuration | Provide configuration parameter to set the retention period for audit records on tenant level
| mod-audit | |
14 | [Instance/Item/Holding/Bib Audit] Configuration | Create a scheduled nightly job to clean up the records that exceed the retention period
| mod-audit | |
15 | [Instance(FOLIO) Audit] Rest Endpoint for history | Query list of diffs per entity from the database with pagination by quarter of the year by entity identifier. Return list of diff records | mod-audit | |
16 | [Instance(MARC) Audit] Rest Endpoint for history | Query list of diffs per entity from the database with pagination by quarter of the year by entity identifier. Return list of diff records | mod-audit | |
17 | [Holding Audit] Rest Endpoint for history | Query list of diffs per entity from the database with pagination by quarter of the year by entity identifier. Return list of diff records | mod-audit | |
18 | [Item Audit] Rest Endpoint for history | Query list of diffs per entity from the database with pagination by quarter of the year by entity identifier. Return list of diff records | mod-audit | |
19 | [Authority Audit] Rest Endpoint for history | Query list of diffs per entity from the database with pagination by quarter of the year by entity identifier. Return list of diff records | mod-audit | |
20 | [Instance/Item/Holding/Bib Audit] Show history Pane in inventory | Call related API to provide the most recent updates. The older records should be fetched only if a user clicks “Show more” button | ui-inventory |
Risks and concerns
Risk | Description | Probability | Impact | Mitigation | |
---|---|---|---|---|---|
1 | Long period for audit records retention | The number of records could overwhelm the capability of the Postgres database both from a computational point of view and cost | High | High | Introduce separate storage for audit-events |
2 | Cascade Updates will create redundant copies in the audit log | The update to holdings causes updates to all related items. Some holdings may contain ~15000 records | High | Medium | Collapse or filter out events that only change the parent entity |
3 | Some flows could update inventory entities without using the Domain-events mechanism | With different capabilities of the system including UI, data import, bulk edit, etc some of the flows might skip sending Domain events and/or edit entities directly | Low | Medium | List those cases and add domain events to flows that has no this capability |
4 | Linked data | The flow and integration with inventory are not clear for the BIBFRAME format | Low | Low | Adjust BIBFRAME flow to follow the proposed solution for other inventory entities |
Product Questions
Question | Answer | Comment | |
---|---|---|---|
1 | Should failure in sending audit message block the create/update/delete operation? | Hey @Kalibek Turgumbayev - what happens today when an update is made and the create/update date and time stamp is not updated? | The question is related to transactional outbox pattern implementation |
2 | What would be the period of retention for Audit records? | @Dennis Bridges has this requirement come up for you with respect to Acq’s change tracker? | The storage options depend on this question:
|
3 | In what form should we show the changes to non-marc fields (e.g. staffSuppress, administrative Notes, etc.) in MARC instances? | @Kalibek Turgumbayev - I am unsure I understand this question. Can you review this mockup of how to display updates made to a FOLIO instance record? | Instance with source FOLIO or MARC from inventory is a separate object than SRS record and should be tracked separately |
4 | If only the order of fields in a MARC record is changed, should it be logged? | @Kalibek Turgumbayev - Good question - I need to ask users but unless it is a significant to implement, answer is Yes. @Dennis Bridges has this requirement come up for you with respect to Acq’s change tracker? |
|
5 | Do we have scenarios where the audit log is exported in batches for some period of dates? | It is possible that a library may want to do so but I do not think it is a requirement for Sunflower. @Dennis Bridges has this requirement come up for you with respect to Acq’s change tracker? | If the solution uses Postgres with partitioning by entity key, such exports would cause significant performance issues. |
6 | Do we need to have remapping or other technical updates as auditable events? | Not for Sunflower | We might need a list of actions leading to an event in the audit log. |
7 | Can we show only the last 20 records (last 3 months)? | Yes. Older records can be fetched with “see more” button and alert that it can take time. | Display of the whole history of the entity will impact performance negatively. |
8 | What should be tracked with BIBFRAME? Should we track the original BIBFRAME record or related MARC records is enough. | For Sunflower only track related MARC records. |
|
Links
Acquisition event log - data retention period is 20 years
Javers - Java object diff library