Audit Logging
Track and monitor all activity within your organization for security and compliance.
Overview
Audit logs provide a chronological record of actions taken within your organization. They help you answer questions like "who changed this template?" and "when was this API key created?"
What Is Logged
| Category | Events |
|---|---|
| Authentication | Sign in, sign out, failed login attempts |
| Organization | Created, updated, member invited, member removed |
| Projects | Created, updated, deleted |
| Templates | Created, updated, deleted, duplicated |
| API Keys | Created, deleted |
| API Usage | Generation requests, errors |
| Settings | Role changes, billing changes |
Log Entry Fields
Each audit log entry includes:
- Timestamp — When the action occurred (UTC)
- Actor — Who performed the action (user email or API key)
- Action — What was done (e.g., template.created)
- Resource — What was affected (e.g., template ID)
- IP Address — Origin of the request
- User Agent — Client information
- Status — Success or failure
Viewing Audit Logs
Access audit logs from your organization dashboard:
- Go to your organization settings
- Select the "Audit Log" tab
- Filter by date range, user, or event type
- Click any entry to see full details
Log Retention
Audit logs are retained for 90 days by default. Enterprise plans can extend retention to 1 year or longer.API Request Logs
In addition to audit logs, the dashboard shows API request logs with:
- Request timestamp
- Endpoint called
- Response status code
- Response time
- API key used (last 4 characters)
Use these logs to debug failed requests, monitor performance, and track usage patterns.
Security Monitoring
Use audit logs to detect suspicious activity:
- Unusual login locations — Sign-ins from unexpected countries or IPs
- Failed login spikes — May indicate a brute-force attempt
- Unexpected API key creation — Someone may have gained unauthorized access
- Bulk template deletion — Could indicate a compromised account
- High API usage — Unusual spike may mean a leaked API key
Set Up Alerts
Configure alerts for critical events like new API key creation, role changes, and member removal so you're notified immediately.Exporting Logs
- Export logs as CSV for offline analysis
- Integrate with your SIEM (Security Information and Event Management) system
- Use exported data for compliance audits
Compliance Use Cases
- SOC 2 — Demonstrate access monitoring and change tracking
- GDPR — Show who accessed personal data and when
- HIPAA — Track access to health-related document templates
- Internal audits — Review team activity and permissions
Next Steps
- Security Overview — Full security documentation
- Team Roles — Manage permissions
- Data Retention — Retention policies