Overview
Audit Logs provide a comprehensive record of all configuration changes and system-level activities within your Apigene Copilot workspace. They enable you to track who made what changes, when they occurred, and maintain compliance with security and governance requirements.What Are Audit Logs?
Audit logs capture system-level events including:- Application changes: Install, update, delete
- Agent modifications: Create, update, delete, visibility changes
- MCP Server changes: Configuration updates
- Context changes: Create, update, delete operations
- User management: Role changes, access grants/revokes
- Security updates: Credential changes, permission modifications
- Settings changes: Configuration updates
Accessing Audit Logs
Navigate to Audit Logs from the main navigation menu to view system activity history.Audit Log Interface
Log List View
Each audit log entry displays: Timestamp- Exact date and time of the event
- Formatted for your timezone
- Sortable for chronological analysis
- Who performed the action
- User email or identifier
- Links to user details
- Create: New resource created
- Update: Existing resource modified
- Delete: Resource removed
- Application: API integrations
- Agent: AI agents
- MCP Server: MCP configurations
- Context: Context items
- User: User account changes
- Settings: System configuration
- Unique identifier of affected resource
- Quick reference for tracking
- Links to resource (if still exists)
Search and Filter
Quick Search
Use the search bar for instant filtering:- Search by user ID
- Search by resource type
- Search by resource ID
- Search by action type
- Real-time results as you type
Advanced Filters
Click Filters to access detailed filtering options: Resource Type Filter- From Date: Start of audit period
- To Date: End of audit period
- Defaults to last 30 days
- Filter by specific user ID
- See activities by individual users
- Audit specific user actions
- Track changes to specific resource
- View complete history of an item
- Useful for troubleshooting
Applying and Clearing Filters
Apply Filters- Configure filter criteria
- Click Apply button
- Results update immediately
- Page resets to page 1
- Click Clear button
- All filters reset to default
- Shows all audit logs again
- Preserves date range selection
Audit Log Details
Click on any log entry to view complete information:Event Summary
Action Information- Action type badge (Create/Update/Delete)
- Color-coded for quick identification:
- Green: Create
- Blue: Update
- Red: Delete
- Resource type badge
- Resource ID with copy function
- Link to resource (if available)
- User ID who performed action
- User role at time of action
- User email address
- Full timestamp with timezone
- ISO format timestamp
- Time since event occurred
Change Details
For Update operations, see: Before Values- Previous configuration
- Old settings
- Original state
- New configuration
- Updated settings
- Modified state
- List of modified fields only
- Highlights what actually changed
- Easy comparison view
Metadata
Additional context about the event: Request Context- Source IP address (if available)
- User agent / client information
- Session ID
- API version used
- System version at time of event
- Processing time
- Related events (if applicable)
- Copy full log data as JSON
- Download specific log entry
- Share log URL (if permitted)
Understanding Audit Events
Application Events
Application CreatedAgent Events
Agent CreatedContext Events
Context CreatedMCP Server Events
MCP Server ConfiguredPagination and Navigation
Viewing Large Result Sets
Page Controls- Items per page: Select 10, 20, 50, or 100
- Previous button: Go to previous page
- Next button: Go to next page
- Page indicator: Shows “Page X of Y”
- Start with more items per page for overview
- Reduce items for detailed review
- Use filters to narrow results first
- Export for offline analysis if needed
Refresh
Click Refresh button to:- Load latest audit logs
- Update current page
- Check for new activity
- Verify recent changes
Use Cases
Security Auditing
Track Sensitive Changes- Filter by resource type: “Application”
- Filter by action: “Update”
- Review security configuration changes
- Verify authorized changes only
- Filter by specific user
- Review all their activities
- Identify unusual patterns
- Ensure proper access usage
- Set date range for audit period
- Export filtered results
- Generate compliance reports
- Document all changes
Troubleshooting
When Did This Break?- Identify when issue started
- Filter audit logs by timeframe
- Review all changes in that period
- Correlate changes with issues
- Filter by resource ID
- View all changes to resource
- Identify who made changes
- Contact for more information
- View audit log details
- Compare before/after values
- Understand exact changes
- Determine impact
Change Management
Track Deployment Changes- Filter by date of deployment
- Review all changes made
- Verify deployment checklist
- Document deployment activities
- Filter by team member
- Monitor configuration changes
- Ensure best practices followed
- Provide feedback as needed
- Export current configuration
- Compare with baseline
- Identify unexpected changes
- Restore or document as needed
Best Practices
Regular Review
Daily Quick Check- Review last 24 hours
- Check for unexpected changes
- Verify critical resources unchanged
- Monitor for security events
- Review all changes for the week
- Analyze change patterns
- Verify compliance
- Document significant changes
- Comprehensive review of all logs
- Generate compliance reports
- Identify optimization opportunities
- Update documentation
Security Monitoring
Watch For- Changes outside business hours
- Bulk delete operations
- Unauthorized access attempts
- Unusual modification patterns
- Security configuration changes
- Critical application changes
- Agent visibility changes to public
- User permission escalations
- Multiple failed operations
- Rapid configuration changes
Documentation
Keep Records Of- Intentional configuration changes
- Deployment activities
- Security incidents
- User access changes
- System updates
- Reason for major changes
- Business justification
- Approval process followed
- Expected impact
- Rollback plan if needed
Integration with Compliance
Regulatory Requirements
GDPR Compliance- Track data access changes
- Document user consent management
- Monitor data export activities
- Verify deletion requests processed
- Access control changes
- Security configuration audit
- Change management documentation
- Incident tracking
- PHI access logging
- Security configuration tracking
- User access management
- Audit trail maintenance
Audit Trail Export
For Compliance- Filter relevant time period
- Apply necessary filters
- Export audit logs
- Store securely with compliance data
- Retain per policy requirements
Troubleshooting
No Logs Appearing
Possible Causes- No changes have been made
- Filters too restrictive
- Date range excludes all activity
- Insufficient permissions
- Verify changes were made
- Clear all filters
- Expand date range
- Check user permissions
- Refresh the page
Can’t See Change Details
Possible Causes- Log data pruned
- Insufficient permissions
- Network issue
- Check data retention policy
- Verify user role permissions
- Refresh connection
- Contact administrator
Export Not Working
Possible Causes- Too much data selected
- Export format not supported
- Browser blocking download
- Network timeout
- Reduce date range
- Apply filters first
- Check browser settings
- Retry with smaller dataset
- Contact support if persists
Privacy and Data Retention
What’s Logged
Included- Configuration changes
- Resource modifications
- User actions
- Timestamps and users
- Change details
- API call payloads
- Sensitive credentials
- User conversation content
- Personal identifiable information (beyond user ID)
Retention Period
- Logs retained based on your plan
- Typical retention: 90 days to 1 year
- Export before retention expires
- Automatic cleanup of old logs
- Can request extended retention
Access Control
- Role-based access to audit logs
- Admin-only access (typically)
- Organization-level visibility
- Secure storage and encryption
- Compliance with data regulations
Next Steps
- Monitor actions for API call details
- Review settings for current configurations
- Check dashboard for usage trends
- Configure applications with proper security
