The Audit Log comprehensively records all critical operations across enterprise resources, giving administrators full visibility into user actions and ensuring data security and operational traceability.

Overview

The audit log system includes the following core capabilities:

  • Comprehensive Coverage: Automatically logs key operations in both workspaces and the admin console.
  • Multi-dimensional Query: Filter logs by time, user, resource type, operation type, etc.
  • Detailed Tracking: Includes operator, timestamp, resource object, source IP, and more.
  • Data Security: Sensitive information is automatically masked to ensure log security.

Viewing the Audit Log

Click Audit Log in the left menu of the Admin Console to enter the audit log view. System administrators can access operation records across all enterprise workspaces and admin console operations.

Log Format

Each audit log entry includes the following key fields:

Field TypeContentDescription
TimeFormat: YYYY/MM/DDPrecise to the second
WorkspaceWorkspace name, IDHover to view ID
Operator InfoEmail, type, nameIncludes member info, permissions, API, SSO types
OperationCreate, delete, update, login, publish, etc.-
Resource TypeAdmins, user groups, etc.(May include mixed values like user groups, API, etc.)
Resource-(May contain mixed resource values)
Parent ResourceType, ID, nameShows resource hierarchy in detail view

Click the Details button on the right of a log entry to view full content:

A parent resource refers to a higher-level resource that created the current one. For example, when a file is uploaded to a knowledge base, a Knowledge Base File resource is created, with the Knowledge Base as its parent.

Workspace Resource Logs

ModuleResource TypeOperation TypeExample ResourceParent ResourceNotes
WorkspaceAppCreateFinance Assistant-
AppDeleteFinance Assistant-
AppImport DSLFinance Assistant-
AppExport DSLFinance Assistant-
AppPublishFinance Assistant-
AppEnable Web AppFinance Assistant-
AppDisable Web AppFinance Assistant-
AppModify Web App AccessFinance Assistant-
AppEnable Backend APIFinance Assistant-
AppDisable Backend APIFinance Assistant-
API KeyCreateapp-****3e80AppLogs parent resource ID and name
API KeyDeleteapp-****3e80AppLogs parent resource ID and name
Knowledge BaseCreateFinance KB-
Knowledge BaseDeleteFinance KB-
Knowledge BaseModify AccessFinance KB-
KB FileDeleteFinancePolicy.docKnowledge BaseLogs parent resource ID and name
KB FileImportFinancePolicy.docKnowledge Base
SettingsMemberInvitePeter-
MemberDeletePeter-
AccountMemberLoginPeter-
MemberChange PasswordPeter-

Admin Console Resource Logs

ModuleResource TypeOperationExample ResourceParent ResourceNotes
WorkspaceWorkspaceCreateOps Workspace-Operator marked as “API” if created via API; logs masked keys
WorkspaceDeleteOps Workspace-
Auth Method ConfigModifyAuth Methods - SSO Config-Includes email/password, code, TTL, registration config
External User Auth ConfigModifySSO Config-Includes SSO enablement and details
MembersMemberCreateAnderson-
MemberDeleteAnderson-
MemberModifyAnderson-
MemberChange PasswordAnderson-
Member GroupModifyIT Ops Group-
Member GroupCreateIT Ops Group-If via API or SCIM 2.0, operator is “Admin API” or “SCIM 2.0”
Member GroupDeleteIT Ops Group-
Member/Group Sync ConfigModify ConfigSync Toggle-
Member/Group Sync ConfigModify ConfigGenerate Token-
SettingsSystem UserCreateAdmin 01-
System UserDeleteAdmin 01-
System UserChange PasswordAdmin 01-
System UserLoginAdmin 01-
System UserLogoutAdmin 01-
Enterprise API KeyCreate237d****dca7-
Enterprise API KeyDelete237d****dca7-
Account / 2FABind 2FASuper Admin-
Account / 2FAGenerate Backup CodeSuper Admin-

Querying Logs

System administrators can filter logs by various conditions to locate specific entries quickly:

Filter DimensionDescriptionRequired
Workspace IDPrecise filtering by workspaceNo
Resource TypeFilter by app, KB, member, etc.No
Operation TypeFilter by create, delete, modify, etc.No
Resource IDFilter by specific resourceNo
Time RangeUp to 3 monthsYes (defaults to 1 month)

Example Log Cases

Workspace Operations

  • Member “Zhang San” deleted the app “Salary Assistant” in the Finance workspace.
  • Member “Li Si” uploaded the file “ReimbursementProcess.pdf” to the “Finance Policies” knowledge base.

Admin Console Operations

  • Admin “Admin” created the “Marketing” workspace.
  • API deleted “Member 01” via the admin console.
  • Admin “Charlie” updated the SSO configuration.

Compliance & Security

Compliance Guarantee

  • Data Integrity: All key actions are recorded fully.
  • Time Accuracy: Unified timestamps ensure proper event ordering.
  • Immutability: Logs cannot be altered after generation.
  • Long-term Retention: Supports enterprise-grade retention strategies.

Security Considerations

  • Access Control: Only system admins can access the audit log.
  • Sensitive Info Protection: Sensitive data is masked to prevent leaks.

Best Practices

Routine Monitoring

  1. Regular Reviews: Review logs periodically to spot irregular activity.
  2. Key Event Monitoring: Focus on delete actions, permission changes, and config updates.
  3. Compliance Reporting: Use logs to create regular compliance reports.

Incident Response

  1. Anomaly Detection: Detect suspicious behavior via log analysis.
  2. Event Tracing: Trace full operation chains during incidents.
  3. Forensics Support: Provide reliable evidence during investigations.

The Audit Log offers full transparency and compliance support, making it a critical feature for enterprise AI application management.