How Audit Logs Work
ABV’s audit logging system automatically captures comprehensive activity records:Automatic capture of all activities
Immutable storage
Access control and viewing
auditLogs:read permission, typically granted to Owner and Admin roles. This restricted access ensures sensitive activity records are only visible to authorized personnel.View audit logs through the ABV UI with filtering by time period, project, action type, and user. Pagination handles large audit trails efficiently.Export for external analysis
What Gets Logged
Auditable Resources and Actions
ABV tracks specific actions across all system resources. The following table shows exactly what gets logged:Observability and Data Resources
Observability and Data Resources
| Resource | Logged Actions |
|---|---|
| Trace | bookmark, delete, publish, updateTags |
| Session | bookmark, publish |
| Score | create, delete, update |
| Score Config | create, update |
| Dataset | create, delete, update |
| Dataset Item | create, delete, update |
| Dataset Run | delete |
| Comment | create, delete |
Prompt Management Resources
Prompt Management Resources
| Resource | Logged Actions |
|---|---|
| Prompt | create, delete, promote, setLabel, update, updateTags |
| Prompt Protected Label | create |
Evaluation and Annotation Resources
Evaluation and Annotation Resources
| Resource | Logged Actions |
|---|---|
| Evaluation Template | create |
| Job (Evaluation Jobs) | create, delete, update |
| Annotation Queue | create, delete, update |
| Annotation Queue Item | complete, create, delete |
Access Control and Security Resources
Access Control and Security Resources
| Resource | Logged Actions |
|---|---|
| Organization | create, delete, update |
| Project | create, delete, transfer, update |
| Organization Membership | create, delete, update |
| Project Membership | create, delete, update |
| Membership Invitation | create, delete |
| API Key | create, delete, update |
| LLM API Key | create, delete |
Configuration and Integration Resources
Configuration and Integration Resources
| Resource | Logged Actions |
|---|---|
| Model | create, delete, update |
| Batch Export | create |
| Batch Action | create, delete |
| Blob Storage Integration | update |
| PostHog Integration | delete, update |
Billing Resources
Billing Resources
| Resource | Logged Actions |
|---|---|
| Stripe Checkout Session | create |
Log Entry Structure
What Each Log Entry Contains
Action Attribution (Who)
Action Attribution (Who)
USER type):- User ID and email address
- User’s organizational and project roles at the time of action
- Authentication method used
API_KEY type):- API key ID and name
- Project or organization the key is scoped to
- Key creation date and creator
Action Details (What)
Action Details (What)
- Resource type: Trace, Prompt, Project, API Key, etc.
- Action: create, update, delete, or resource-specific actions (bookmark, publish, transfer)
- Resource ID: Unique identifier of the affected resource
- Resource name: Human-readable name when available
- Before state: Complete resource state prior to modification (JSON)
- After state: Complete resource state after modification (JSON)
Context (Where and When)
Context (Where and When)
- Timestamp: Millisecond-precision UTC timestamp
- Organization ID and name
- Project ID and name (for project-scoped actions)
- IP address (when available)
- User agent (for UI actions)
Using Audit Logs
Viewing Logs in the UI
Access audit logs
auditLogs:read permission (Owner and Admin roles).Filter and search
- Time range: Last 24 hours, last 7 days, last 30 days, or custom range
- Project: View logs for specific projects or all projects in the organization
- Action type: Filter by create, update, delete, or specific actions
- User: Show actions by specific users or API keys
Examine entry details
Exporting Audit Logs
Export logs for external analysis, archival, or SIEM integration:Configure filters
Click export button
Choose format and download
- JSON: Full fidelity with all fields and nested structures (recommended for programmatic analysis)
- CSV: Flattened format for spreadsheet analysis
Integrate with external systems
Common Use Cases
Security Incident Investigation
Security Incident Investigation
Compliance Audits (SOC 2, HIPAA, GDPR)
Compliance Audits (SOC 2, HIPAA, GDPR)
Debugging Production Issues
Debugging Production Issues
Insider Threat Detection
Insider Threat Detection
Change Management and Approval Tracking
Change Management and Approval Tracking
User Activity Audits
User Activity Audits
Security and Retention
Immutability Guarantee
Immutability Guarantee
Access Control
Access Control
auditLogs:read permission can view audit logs. This permission is typically granted to Owner and Admin roles.Best practice: Limit audit log access to security personnel and senior administrators. Regular users and Members should not have access to audit logs.Learn more about RBAC →Data Retention
Data Retention
Export and Archival
Export and Archival
- Long-term archival: Compliance requirements often exceed online retention periods
- SIEM integration: Feed logs into security monitoring systems
- Compliance reporting: Generate audit reports for regulators
- Disaster recovery: Maintain backup copies of critical audit records
Integration with External Systems
SIEM Integration
Integrate audit logs with Security Information and Event Management (SIEM) systems for automated monitoring:Schedule regular exports
Ingest into SIEM
Create detection rules
- Multiple failed authentication attempts
- Unusual API key usage patterns
- Off-hours access to production projects
- Bulk data exports
- Privilege escalation (role changes)
Configure alerts
Compliance Management Platforms
Export audit logs for compliance management platforms (Vanta, Drata, SecureFrame):- Scheduled exports: Weekly exports covering all audit activities
- Evidence collection: Logs demonstrating access control enforcement, data modification tracking, and security monitoring
- Automated compliance: Platforms analyze logs to verify compliance controls are working correctly