Help Center← Back to Dashboard
Getting Started
What is Aithroyz?Quickstart: First EnvironmentCloud CredentialsPlans & Approvals
Environments
OverviewLifecycle PhasesTTL Auto-DestroyExtending TTLDestroying an Environment
Tools Reference
OverviewElastic Stack (SIEM)Wazuh (XDR)MITRE CalderaTheHive & DFIR-IRISVelociraptorOpenCTIGrafana + PrometheusShuffle SOARn8nUptime KumaLLM GatewayOpen WebUIFlowiseOpenClawOllamaQdrantLangfusePortainerGiteaSonarQubeCode ServerMattermostMinIOMetabaseHashiCorp VaultKeycloak SSONetBoxLocalStack
Access & Security
Google SSOTenant IsolationPasskeys & MFATeam Members
API & Integrations
API KeysMCP Tools (Clevername)Terraform ExportWebhooks & Callbacks
Stack Presets
SOC PlatformIR / DFIR LabThreat HuntingQuick Sandbox
Settings
Cloud KeysAPI KeysBillingAudit Log
Troubleshooting
Common IssuesDeployment FailuresDNS & ConnectivityTool Health Checks
Aithroyz Help
Help CenterSettingsAudit Log

Audit Log

The Audit Log records every significant action taken in your workspace — plan submissions, approvals, deployments, destroys, credential changes, and team updates.

Audit logs are available in Settings → Audit. All entries include a timestamp, the user or API key that performed the action, and the affected resource. Logs are retained for 90 days.

Logged events

Environments
Plan created, plan approved, deployment started, deployment completed, deployment failed, destroy initiated, destroy completed
Credentials
Cloud key added, cloud key rotated, cloud key deleted, API key created, API key revoked
Team
Member invited, member role changed, member removed, invitation expired
Auth
Login (email, Google, passkey), password changed, passkey added, passkey removed
API
All API requests made with aitz_* keys, including the key name and endpoint called

Filtering and export

Use the date range picker and event type filter in Settings → Audit to narrow down entries. Click Export CSV to download a filtered log for compliance or incident review purposes.

ℹ
Audit log entries cannot be deleted or modified by any user, including workspace owners. This ensures the log is a reliable record of all activity.
Related Articles
Team MembersRead article →API KeysRead article →