Guides

Audit Logs

Track administrative actions across your organization with a complete, immutable activity trail.

| View as Markdown
Hunter Hodnett
Hunter Hodnett CPTO at Chipp
| 1 min read
# enterprise # audit # compliance # security

Audit Logs provide a complete record of who did what, when, and on what resources across your organization. Essential for compliance, security audits, and operational transparency.

⚠️

Audit Logs require a Studio Pro plan or higher and are accessible to organization owners and admins only.

Accessing Audit Logs

Navigate to SettingsAccess ControlAudit Log.

You’ll see a chronological list of all administrative events with:

  • Actor — Who performed the action (name and email)
  • Action — What they did (color-coded by type)
  • Timestamp — When it happened (with relative time display)
  • Details — Click any row to see full context

What Gets Tracked

Audit Logs capture 100+ event types across all administrative areas:

Member Management

  • Member invited, invite accepted, invite revoked
  • Role changed, member offboarded, member reactivated
  • Workspace member added, removed, permissions updated

App Lifecycle

  • App created, deleted, duplicated, moved
  • App published, rolled back, version restored
  • App settings updated

Billing & Subscriptions

  • Subscription changed, cancelled
  • Top-up settings updated, notification settings updated
  • Stripe Connect initiated, disconnected

Integrations & Connections

  • OAuth connected, disconnected
  • Channel configured (WhatsApp, Slack, Email, Discord, GitHub)
  • MCP integration created, updated, deleted
  • Phone number purchased, released
  • Custom domain and sender domain events

Knowledge & AI

  • Knowledge source created, deleted, linked, unlinked
  • Agent links created, deleted
  • Voice clones created, deleted

Organization Settings

  • Workspace created, updated, deleted
  • Whitelabel configuration changes
  • Consumer monetization (packages created, updated, deleted)

Filtering Events

Use the action type dropdown to filter by specific event categories. Events are grouped and color-coded:

ColorMeaningExamples
GreenCreates, invites, connectionsMember invited, app created, integration connected
BlueUpdates, changesRole changed, settings updated
RedDeletions, removalsMember offboarded, app deleted, integration disconnected

Event Details

Click any event row to expand full details:

FieldWhat It Shows
ActorEmail of the person who performed the action, or “System” for automated events
Target userIf applicable, the person affected (e.g., the invited member)
ResourceType and ID of the affected resource (workspace, app, domain, etc.)
TimestampExact date and time (ISO 8601)
IP addressClient IP address of the actor
User agentBrowser and device information
Context (JSON)Action-specific details (previous values, new values, reasons, etc.)

Example: Role Changed

plaintext
Actor: admin@company.com
Action: member.role_changed
Target: team@company.com
Details:
  Previous role: member
  New role: admin

API Access

Query audit logs programmatically:

plaintext
GET /api/organization/rbac/members/audit-log

Query parameters:

ParameterDescriptionExample
actionFilter by event typemember.invited
targetUserIdFilter by affected userUUID
sinceFilter by date2026-03-15
limitResults per page (max 200)50
offsetPagination offset0

Use Cases

ScenarioWhat to Look For
Security auditFilter for member.offboarded, member.role_changed, integration.connected
Billing investigationFilter for subscription.changed, billing.top_up events
Compliance reviewExport full activity trail for a date range
Incident responseSearch for actions around a specific timestamp
Onboarding verificationTrack invite acceptance and permission grants