intermediate4 min read

Audit Logs

Audit Logs

Audit logs provide a complete record of all actions taken within your AI for Database organization. They are essential for security reviews, compliance, and troubleshooting.

What Is Logged

Every significant action is recorded:

  • Authentication events -- logins, logouts, failed login attempts, SSO events
  • Connection changes -- connections created, modified, deleted, tested
  • Query activity -- queries executed, saved, deleted (the SQL is logged, not the results)
  • Dashboard activity -- dashboards created, modified, shared, deleted
  • Workflow activity -- workflows created, modified, executed, failed
  • Team changes -- members invited, removed, roles changed
  • Settings changes -- any configuration change by any user

Viewing Audit Logs

Navigate to Settings > Audit Logs. Logs are displayed in reverse chronological order with the following fields:

  • Timestamp -- when the event occurred (in your timezone)
  • Actor -- who performed the action (email and IP address)
  • Action -- what was done (e.g., "query.executed", "connection.created")
  • Resource -- what was affected (e.g., the query ID, dashboard name)
  • Details -- additional context specific to the action

Searching and Filtering

Filter logs by:

  • Date range
  • Actor (specific user)
  • Action type
  • Resource type

The search bar supports free-text search across all fields.

Exporting Logs

Click Export to download logs as CSV or JSON. Exports respect your current filters, so you can export specific date ranges or action types.

Log Forwarding (Enterprise)

Forward audit logs in real-time to your SIEM or log management system:

  • Splunk -- HTTP Event Collector integration
  • Datadog -- Log forwarding via API
  • AWS CloudWatch -- direct integration
  • Custom webhook -- send logs as JSON to any endpoint

Retention

Audit logs are retained for 1 year on Pro plans and 3 years on Enterprise plans. Extended retention is available on request.