Audit Logs

Review system activity and changes for compliance and security monitoring. Access from SettingsOrganizationAudit Logs card.

Accessing Audit Logs

  1. Go to Settings in the sidebar
  2. Click the Organization tab
  3. Click the Audit Logs card

Filtering Logs

Use the Filters card to narrow down results:

Date Range

  • Start Date: Beginning of the range
  • End Date: End of the range
  • Default: Last 30 days

Action Type

Select from the dropdown:

  • All actions (default)
  • auth.login, auth.logout
  • api_key.create, api_key.delete
  • knowledge.create, knowledge.update
  • channel.create, channel.connect
  • message.send
  • db.update
  • And more...

Resource Type

Free text filter:

  • Enter channel, knowledge, user, etc.
  • Filters to logs affecting that resource type

Search by description or resource ID:

  • Enter keywords
  • Searches across log descriptions

Log Table

Each entry shows:

Column Description
Expand Click to see full details
Timestamp When the action occurred (YYYY-MM-DD HH:MM:SS)
Action Color-coded badge showing action type
Resource Resource type and truncated ID
User User ID (truncated) and role badge
Description Summary of what happened
IP Address Source IP of the action

Action Badge Colors

  • Default: Auth actions (login, logout)
  • Destructive: API key actions
  • Secondary: Knowledge and message actions
  • Outline: Channel and database actions

Expanded Details

Click the expand button to see:

  • Full User ID
  • Full Resource ID
  • Complete IP Address
  • Tenant ID
  • User Agent (browser/client info)
  • Full Metadata (JSON format)

Exporting Logs

  1. Apply your desired filters
  2. Click Export CSV
  3. Download the CSV file with all visible logs

Note: Export is disabled when no logs match your filters.

Common Use Cases

Security Investigation

  1. Filter by auth.login or api_key actions
  2. Check for unusual IP addresses
  3. Look for failed login attempts

Change Tracking

  1. Filter by knowledge.update or db.update
  2. See who made changes and when
  3. Review the metadata for specific changes

Compliance Audit

  1. Set date range for audit period
  2. Export full CSV
  3. Review with compliance team

Best Practices

  1. Regular reviews: Check logs weekly for anomalies
  2. Export for compliance: Keep CSV exports for audit trails
  3. Monitor sensitive actions: Watch API key and permission changes
  4. Check IP addresses: Look for access from unexpected locations