Skip to main content

Audit Log

The audit log provides a chronological record of all significant actions taken within your organization. Use it to track who did what, when, and with what context — essential for security reviews, compliance, and debugging access issues.

:::info Business or Enterprise Only The audit log is available on Business and Enterprise plans. Team plan organizations do not have access to audit log data. :::

Tracked Actions

The audit log records the following events:

ActionDescription
org.createdOrganization was created
org.updatedOrganization settings were changed
member.invitedA new member was invited
member.role_changedA member's role was updated
member.removedA member was removed from the org
workspace.createdA new workspace was created
workspace.updatedWorkspace settings were changed
workspace.deletedA workspace was deleted
workspace.startedA workspace was started (pod created)
workspace.stoppedA workspace was stopped (pod removed)
bridge.createdA bridge between workspaces was created
bridge.deletedA bridge was deleted
apikey.createdAn API key was generated
apikey.revokedAn API key was revoked
billing.plan_changedThe organization's plan was upgraded or downgraded
data_connection.createdA data connection (BigQuery, Snowflake, etc.) was added
data_connection.deletedA data connection was removed

Viewing the Audit Log

  1. Navigate to Organization Settings → Audit Log.
  2. The log displays entries in reverse chronological order (newest first).
  3. Use filters to narrow results by:
    • Action type — e.g., show only member.* events
    • Actor — filter by the person who performed the action
    • Date range — focus on a specific time window

Log Entry Fields

Each audit log entry contains the following fields:

FieldDescriptionExample
actionThe event type identifiermember.invited
actorThe user ID of the person who performed the actionuser_5f3a...
emailThe email address of the actoralice@acme.com
metadataAdditional context specific to the action (JSON){ "targetEmail": "bob@acme.com", "role": "member" }
timestampWhen the action occurred (ISO 8601, UTC)2026-05-21T17:30:00.000Z

Example Log Entry

{
"action": "member.invited",
"actor": "user_5f3a8b2c",
"email": "alice@acme.com",
"metadata": {
"targetEmail": "bob@acme.com",
"role": "member"
},
"timestamp": "2026-05-21T17:30:00.000Z"
}

Metadata by Action Type

The metadata field varies by action type:

ActionMetadata Fields
member.invitedtargetEmail, role
member.role_changedtargetEmail, previousRole, newRole
member.removedtargetEmail
workspace.createdworkspaceId, name, provider
workspace.deletedworkspaceId, name
bridge.createdbridgeId, sourceWorkspaceId, targetWorkspaceId
apikey.createdkeyPreview
apikey.revokedkeyPreview
billing.plan_changedpreviousPlan, newPlan

Data Retention

PlanRetention Period
Business90 days
Enterprise1 year (configurable)

:::tip Exporting Audit Data For long-term retention beyond your plan's window, export audit log data regularly using the Roundtable API. Enterprise customers can configure custom retention policies and SIEM integrations. :::

Audit log entries are immutable — they cannot be edited or deleted by any user, including the Owner. This ensures the integrity of your audit trail.