Audit Logs & Activity Monitoring
Track all user actions and system events for compliance and security.
Read time:3 minUpdated:2026-01-10
Audit Logs & Activity Monitoring
TyneBase provides comprehensive audit logging to help you maintain compliance and investigate security incidents.
What We Log
User Actions
| Event | Details Captured |
|---|---|
| Login/Logout | User, timestamp, IP address |
| Document CRUD | Action, document ID, user, changes |
| Permission changes | Who, what, before/after values |
| Settings changes | Setting name, old/new value |
| User invitations | Invited user, who invited, timestamp |
| AI usage | Prompts, model used, tokens consumed |
Action Types
Logs are categorized by action type:
- auth: Authentication events
- document: Document operations
- user: User management
- settings: Settings changes
- chat: Chat and discussion activity
Accessing Audit Logs
Via Dashboard
- Go to Settings → Audit Logs
- Use filters:
- Action type
- Search by action or target name
- Pagination
- Export logs as CSV
Via API
curl -X GET "https://api.tynebase.com/api/audit/logs" \
-H "Authorization: Bearer YOUR_TOKEN" \
-d "action_type=document" \
-d "search=update"
Export to CSV
Download all filtered logs as CSV:
- Go to Settings → Audit Logs
- Apply desired filters
- Click Export CSV
- File includes: timestamp, action, actor, target, IP, and metadata
Content Health Monitoring
Audit logs include content health statistics:
- Total documents: Document count in workspace
- Published vs Draft: Publication status breakdown
- Stale documents: Documents not updated recently
- Needs review: Documents requiring attention
- Health distribution: Excellent, good, needs review, poor
View in Settings → Audit Logs → Statistics.
Document Reviews
Schedule and track document reviews:
- Create reviews for specific documents
- Set due dates and priority levels
- Assign reviewers
- Track review status (pending, in progress, completed)
- View review queue
Retention
Audit logs are retained according to your plan:
- Logs are stored indefinitely for compliance
- Export CSV for your own records
- Contact support for custom retention policies
Best Practices
- Review regularly: Check audit logs weekly
- Export backups: Download logs periodically
- Track sensitive access: Monitor who views confidential documents
- Monitor failed logins: Investigate repeated authentication failures