Audit Logs & Activity Monitoring

Track all user actions and system events for compliance and security.

Read time:3 minUpdated:2026-01-10

Audit Logs & Activity Monitoring

TyneBase provides comprehensive audit logging to help you maintain compliance and investigate security incidents.

What We Log

User Actions

Event Details Captured
Login/Logout User, timestamp, IP address
Document CRUD Action, document ID, user, changes
Permission changes Who, what, before/after values
Settings changes Setting name, old/new value
User invitations Invited user, who invited, timestamp
AI usage Prompts, model used, tokens consumed

Action Types

Logs are categorized by action type:

  • auth: Authentication events
  • document: Document operations
  • user: User management
  • settings: Settings changes
  • chat: Chat and discussion activity

Accessing Audit Logs

Via Dashboard

  1. Go to SettingsAudit Logs
  2. Use filters:
    • Action type
    • Search by action or target name
    • Pagination
  3. Export logs as CSV

Via API

curl -X GET "https://api.tynebase.com/api/audit/logs" \
  -H "Authorization: Bearer YOUR_TOKEN" \
  -d "action_type=document" \
  -d "search=update"

Export to CSV

Download all filtered logs as CSV:

  1. Go to SettingsAudit Logs
  2. Apply desired filters
  3. Click Export CSV
  4. File includes: timestamp, action, actor, target, IP, and metadata

Content Health Monitoring

Audit logs include content health statistics:

  • Total documents: Document count in workspace
  • Published vs Draft: Publication status breakdown
  • Stale documents: Documents not updated recently
  • Needs review: Documents requiring attention
  • Health distribution: Excellent, good, needs review, poor

View in SettingsAudit LogsStatistics.

Document Reviews

Schedule and track document reviews:

  • Create reviews for specific documents
  • Set due dates and priority levels
  • Assign reviewers
  • Track review status (pending, in progress, completed)
  • View review queue

Retention

Audit logs are retained according to your plan:

  • Logs are stored indefinitely for compliance
  • Export CSV for your own records
  • Contact support for custom retention policies

Best Practices

  • Review regularly: Check audit logs weekly
  • Export backups: Download logs periodically
  • Track sensitive access: Monitor who views confidential documents
  • Monitor failed logins: Investigate repeated authentication failures