Document Stack
Document Stack
Docs

Audit Logging

Track and monitor all activity within your organization for security and compliance.

Overview

Audit logs provide a chronological record of actions taken within your organization. They help you answer questions like "who changed this template?" and "when was this API key created?"

What Is Logged

CategoryEvents
AuthenticationSign in, sign out, failed login attempts
OrganizationCreated, updated, member invited, member removed
ProjectsCreated, updated, deleted
TemplatesCreated, updated, deleted, duplicated
API KeysCreated, deleted
API UsageGeneration requests, errors
SettingsRole changes, billing changes

Log Entry Fields

Each audit log entry includes:

  • Timestamp — When the action occurred (UTC)
  • Actor — Who performed the action (user email or API key)
  • Action — What was done (e.g., template.created)
  • Resource — What was affected (e.g., template ID)
  • IP Address — Origin of the request
  • User Agent — Client information
  • Status — Success or failure

Viewing Audit Logs

Access audit logs from your organization dashboard:

  1. Go to your organization settings
  2. Select the "Audit Log" tab
  3. Filter by date range, user, or event type
  4. Click any entry to see full details

Log Retention

Audit logs are retained for 90 days by default. Enterprise plans can extend retention to 1 year or longer.

API Request Logs

In addition to audit logs, the dashboard shows API request logs with:

  • Request timestamp
  • Endpoint called
  • Response status code
  • Response time
  • API key used (last 4 characters)

Use these logs to debug failed requests, monitor performance, and track usage patterns.

Security Monitoring

Use audit logs to detect suspicious activity:

  • Unusual login locations — Sign-ins from unexpected countries or IPs
  • Failed login spikes — May indicate a brute-force attempt
  • Unexpected API key creation — Someone may have gained unauthorized access
  • Bulk template deletion — Could indicate a compromised account
  • High API usage — Unusual spike may mean a leaked API key

Set Up Alerts

Configure alerts for critical events like new API key creation, role changes, and member removal so you're notified immediately.

Exporting Logs

  • Export logs as CSV for offline analysis
  • Integrate with your SIEM (Security Information and Event Management) system
  • Use exported data for compliance audits

Compliance Use Cases

  • SOC 2 — Demonstrate access monitoring and change tracking
  • GDPR — Show who accessed personal data and when
  • HIPAA — Track access to health-related document templates
  • Internal audits — Review team activity and permissions

Next Steps