Skip to main content
Audit logs capture every mutation in your workspace — key creation, permission changes, revocations, and more. They’re essential for security compliance, debugging, and understanding who changed what and when.

Why audit logs matter

Security investigations

When something goes wrong, trace exactly what happened and who was responsible.

Compliance requirements

SOC 2, HIPAA, and other frameworks require audit trails for sensitive operations.

Team visibility

Know when team members create, modify, or revoke keys — especially in shared workspaces.

Debugging

Figure out why a key stopped working or when a permission was changed.

What’s captured

Every mutation is logged automatically:
CategoryEvents
KeysCreate, update, revoke, delete, verify (failures)
APIsCreate, update, delete
PermissionsCreate, update, delete, attach to key, remove from key
RolesCreate, update, delete, assign, unassign
Rate limitsCreate namespace, update limits, set overrides
WorkspaceMember added, member removed, settings changed

Accessing audit logs

  1. Sign into the Dashboard
  2. Click Audit Logs in the left navigation

Reading the log

Each entry shows:
FieldDescription
TimeWhen the change occurred
ActorWho made the change — a user (dashboard) or root key (API)
ActionThe operation: Create, Update, Delete, etc.
EventWhat was affected: key, permission, API, etc.
DescriptionHuman-readable summary
Click any row to see full details, including the complete request/response payloads:

Filtering logs

Use the filters at the top of the audit log page to narrow down:
  • Event type — Show only key events, permission events, etc.
  • Actor — Filter by specific user or root key
  • Time range — Focus on a specific period

Retention

Audit logs are retained based on your plan:
PlanRetention
Free7 days
Pro90 days
EnterpriseCustom (up to unlimited)
Need longer retention? Contact us about enterprise options.

Next steps

Last modified on February 16, 2026