Audit Logs
Review system activity and changes for compliance and security monitoring. Access from Settings → Organization → Audit Logs card.
Accessing Audit Logs
- Go to Settings in the sidebar
- Click the Organization tab
- Click the Audit Logs card
Filtering Logs
Use the Filters card to narrow down results:
Date Range
- Start Date: Beginning of the range
- End Date: End of the range
- Default: Last 30 days
Action Type
Select from the dropdown:
All actions(default)auth.login,auth.logoutapi_key.create,api_key.deleteknowledge.create,knowledge.updatechannel.create,channel.connectmessage.senddb.update- And more...
Resource Type
Free text filter:
- Enter
channel,knowledge,user, etc. - Filters to logs affecting that resource type
Search
Search by description or resource ID:
- Enter keywords
- Searches across log descriptions
Log Table
Each entry shows:
| Column | Description |
|---|---|
| Expand | Click to see full details |
| Timestamp | When the action occurred (YYYY-MM-DD HH:MM:SS) |
| Action | Color-coded badge showing action type |
| Resource | Resource type and truncated ID |
| User | User ID (truncated) and role badge |
| Description | Summary of what happened |
| IP Address | Source IP of the action |
Action Badge Colors
- Default: Auth actions (login, logout)
- Destructive: API key actions
- Secondary: Knowledge and message actions
- Outline: Channel and database actions
Expanded Details
Click the expand button to see:
- Full User ID
- Full Resource ID
- Complete IP Address
- Tenant ID
- User Agent (browser/client info)
- Full Metadata (JSON format)
Exporting Logs
- Apply your desired filters
- Click Export CSV
- Download the CSV file with all visible logs
Note: Export is disabled when no logs match your filters.
Common Use Cases
Security Investigation
- Filter by
auth.loginorapi_keyactions - Check for unusual IP addresses
- Look for failed login attempts
Change Tracking
- Filter by
knowledge.updateordb.update - See who made changes and when
- Review the metadata for specific changes
Compliance Audit
- Set date range for audit period
- Export full CSV
- Review with compliance team
Best Practices
- Regular reviews: Check logs weekly for anomalies
- Export for compliance: Keep CSV exports for audit trails
- Monitor sensitive actions: Watch API key and permission changes
- Check IP addresses: Look for access from unexpected locations