Skip to main content

Complete Activity Tracking for Your Organization

Real-time security and activity monitoring for your organization. Track authentication events, data access, and system activities with complete audit trails. Image

Key Features

Real-Time Streaming

WebSocket streaming of audit events to admin users

6-Month Retention

Audit logs retained for 6 months (RAG operations: 3 months)

Export Functionality

Export logs for any time frame (CSV format)

Expandable Details

Click any log row to view complete information

Event Types

Audit logs capture four categories of events:

Authentication Events

  • User logins and logouts
  • Failed login attempts
  • MFA enrollment and verification
  • SSO authentication

Data Access Events

  • Create, read, update, delete operations
  • File uploads and downloads
  • QA pair modifications
  • Response generation

Security Events

  • Permission changes
  • Access denials
  • Suspicious activity detection
  • Password changes

System Events

  • Background task completions
  • Export operations
  • Integration activities
  • System errors

Time Range Filters

FilterDescription
Last 24 hoursRecent activity
Last 7 daysWeekly view
Last 30 daysMonthly view
Last 90 daysQuarterly view
Custom rangeSelect specific dates

Event Filters

Filter logs by:
  • Event type (authentication, data access, security, system)
  • Severity level (info, warning, error, critical)
  • Resource type (source, file, QA pair, user)
Filter logs by specific user:
  • Dedicated user search field
  • Search by user ID or email
  • Track individual user activity

Expandable Log Details

Click any log row to open a detailed view showing:
  • Timestamp: Exact time of the event
  • Event Type: Category and action
  • User: Who performed the action
  • Resource Details: What was affected
  • Request Info: IP address, user agent
  • Full JSON: Complete event data

Export Capabilities

Export audit logs for compliance documentation and external analysis.

Export Features

  • Export any time frame
  • CSV format for spreadsheet analysis
  • Includes all event details
  • Preserves sensitive data redaction

Export Limits

  • Rate-limited exports per organization
  • Covers all event types in a single export

Data Security

Sensitive Data Protection

Audit logs automatically sanitize sensitive information:
  • JWT tokens redacted
  • API keys masked
  • Passwords never logged
  • Personal data protected

Storage Location

  • Logs stored in your organization’s isolated database
  • Same security controls as your other data
  • European data centers

Request Correlation

  • UUID-based request tracing
  • Connect related events across systems
  • Useful for debugging and compliance

Admin-Only Access

Audit logs are only accessible to organization administrators:
  • Admins can view all organization activity
  • Regular members cannot access audit logs
  • Activity is logged even for admin users

Compliance Use Cases

Export logs for external security auditors to demonstrate access controls and monitoring capabilities.
Use detailed logs to investigate security incidents, track unauthorized access attempts, and understand the scope of any issues.
Generate reports on user activity for internal reviews, identifying usage patterns and potential policy violations.
Maintain evidence of security controls for GDPR, SOC 2, and other compliance frameworks.