What’s Logged
The following actions create audit log entries:| Category | Actions |
|---|---|
| API Keys | Key created, key revoked |
| Invitations | Invitation sent, invitation accepted, invitation cancelled |
| Members | Role changed, member removed |
| Organization | Organization settings updated |
| Policy | Policy updated |
| Auth | Login, logout, signup |
Viewing Audit Logs
Navigate to Platform Settings > Org Settings > Audit Log (/settings/audit-log) to browse the full log. Each entry shows:
| Field | Description |
|---|---|
| Timestamp | When the action occurred |
| Action | What was done (with color-coded icon) |
| Resource ID | What was affected |
| Actor | Who performed the action (user email) |
- Audit ID — Unique identifier for the log entry
- Resource type — Category of the affected resource (API Key, User, Invitation, etc.)
- IP address — Source IP of the action
- Details — Additional context in JSON format
Filtering
Use the filter bar and time range controls to narrow down the log:- Time range — Quick-select pills: 1h, 24h, 7d, 30d, or 90d
- Action — Filter by specific action type (e.g., “API Key Created”, “Role Changed”)
- Resource — Filter by resource type (e.g., API Key, User, Policy)
- User Email — Free-text search by the actor’s email address
Use Cases
Compliance
Demonstrate to auditors that access and changes are tracked and attributable.
Incident Investigation
Trace back who made a change and when, if something goes wrong.
Change Management
Track when policies were modified and by whom.
Access Review
Review who was added or removed from the team and when.