Overview
Audit logging automatically captures and stores detailed records of user activities, system events, and administrative actions within your organization. This feature is essential for:- Security Monitoring: Track unauthorized access attempts and suspicious activities
- Compliance Requirements: Meet regulatory standards for data access and modification tracking
- Operational Oversight: Monitor workflow executions and system usage patterns
- Troubleshooting: Investigate issues by reviewing historical activity patterns
- Data Governance: Maintain comprehensive records of data access and modifications
Accessing Audit Logs
Navigate to your organization’s audit logging interface at: gumloop.com/settings/organization/audit-logging
Tracked Events
The audit logging system captures a comprehensive range of activities across the platform:Authentication Events
- User Sign-ins: Records when users authenticate to the platform
- Session Management: Tracks session creation and termination
Credential Management
- Credential Creation: New API keys, OAuth connections, and service integrations
- Credential Modification: Updates to existing authentication credentials
- Credential Deletion: Removal of credentials from the system
- Credential Retrieval: Access to stored credentials for workflow execution
Workspace Operations
- Workspace Creation: New workspace setup and configuration
- Member Management: Adding or removing users from workspaces
- Workspace Deletion: Permanent removal of workspaces
- Workspace Renaming: Changes to workspace names and metadata
Organization Management
- Member Addition/Removal: Changes to organization membership
- Domain Configuration: Updates to organization domain settings
- Metadata Updates: Changes to organization settings and configuration
Permission Group Management
- Group Creation: New permission groups and access controls
- Member Changes: Adding or removing users from permission groups
- Group Deletion: Removal of permission groups
Flow Operations
- Flow Execution: Workflow runs and automation triggers
- Flow Termination: Manual or automatic stopping of workflows
- Flow Completion: Successful workflow completions
- Run Retrieval: Access to workflow execution results and logs
File Operations
- File Uploads: Documents and data uploaded to the platform
- File Downloads: Access to stored files and documents
- File Deletion: Removal of files from the system
Audit Log Data Structure
Each audit log entry contains comprehensive metadata and contextual information: Example ofworkbook creation
logs:
Core Event Data
- Event ID: Unique identifier for each logged event
- Timestamp: Precise date and time when the event occurred (ISO format)
- Event Type: Categorization of the specific action performed
- User ID: Identifier of the user who performed the action
Request Context
- Source IP Address: Network location from which the action was initiated
- Session Information: Authentication context and session details
Event Details
- JSON Object: Action-specific information and parameters
- Resource Identifiers: IDs of affected workspaces, flows, or other resources
API Access
For programmatic access to audit logs, use the REST API endpoint.Endpoint Details
Required Parameters
organization_id
(string): ID of the organization to retrieve logs foruser_id
(string): Your user ID (must be organization admin)start_time
(datetime): Start timestamp for filtering (ISO format)end_time
(datetime): End timestamp for filtering (ISO format)
Optional Parameters
page
(integer): Page number for pagination (default: 1)page_size
(integer): Records per page (default: 50)
Authentication
Include your API key in the Authorization header:Example API Call
Data Privacy and Security
Data Protection
- Encryption: All audit logs are encrypted at rest and in transit
- Access Control: Logs are accessible only to organization administrators
- Data Isolation: Organization audit logs are completely isolated from other organizations
Retention and Compliance
- Data Retention: Audit logs are retained according to Enterprise agreement terms
- Compliance Standards: Meets SOC2 Type II and GDPR requirements
- Data Export: Full export capabilities for compliance and backup purposes