Audit Logs

Track every action taken across your organization's workspaces

Audit logs give your organization a tamper-evident record of every significant action taken across workspaces — who did what, when, and on which resource. Use them for security reviews, compliance investigations, and incident response.


Viewing audit logs

In the UI

Go to Settings → Enterprise → Audit Logs in your workspace. Logs are displayed in a table with the following columns:

Audit Logs settings showing a table of events with columns for Timestamp, Event, Description, and Actor, along with search and filter controls
ColumnDescription
TimestampWhen the action occurred.
EventThe action taken, e.g. workflow.created.
DescriptionA human-readable summary of the action.
ActorThe email address of the user who performed the action.

Use the search bar, event type filter, and date range selector to narrow results.

Via API

Audit logs are also accessible through the Sim API for integration with external SIEM or log management tools.

GET /api/v1/audit-logs
Authorization: Bearer <api-key>

Query parameters:

ParameterTypeDescription
actionstringFilter by event type (e.g. workflow.created)
resourceTypestringFilter by resource type (e.g. workflow)
resourceIdstringFilter by a specific resource ID
workspaceIdstringFilter by workspace
actorIdstringFilter by user ID (must be an org member)
startDatestringISO 8601 date — return logs on or after this date
endDatestringISO 8601 date — return logs on or before this date
includeDepartedbooleanInclude logs from members who have since left the organization (default false)
limitnumberResults per page (1–100, default 50)
cursorstringOpaque cursor for fetching the next page

Example response:

{
  "data": [
    {
      "id": "abc123",
      "action": "workflow.created",
      "resourceType": "workflow",
      "resourceId": "wf_xyz",
      "resourceName": "Customer Onboarding",
      "description": "Created workflow \"Customer Onboarding\"",
      "actorId": "usr_abc",
      "actorName": "Alice Smith",
      "actorEmail": "alice@company.com",
      "workspaceId": "ws_def",
      "metadata": {},
      "createdAt": "2026-04-20T21:16:00.000Z"
    }
  ],
  "nextCursor": "eyJpZCI6ImFiYzEyMyJ9"
}

Paginate by passing the nextCursor value as the cursor parameter in the next request. When nextCursor is absent, you have reached the last page.

The API accepts both personal and workspace-scoped API keys. Rate limits apply — the response includes X-RateLimit-* headers with your current limit and remaining quota.


Event types

Audit log events follow a resource.action naming pattern. The table below lists the main categories.

CategoryExample events
Workflowsworkflow.created, workflow.deleted, workflow.deployed, workflow.locked
Workspacesworkspace.created, workspace.updated, workspace.deleted
Membersmember.invited, member.removed, member.role_changed
Permission groupspermission_group.created, permission_group.updated, permission_group.deleted
Environmentsenvironment.updated, environment.deleted
Knowledge basesknowledge_base.created, knowledge_base.deleted, connector.synced
Tablestable.created, table.updated, table.deleted
API keysapi_key.created, api_key.revoked
Credentialscredential.created, credential.deleted, oauth.disconnected
Organizationorganization.updated, org_member.added, org_member.role_changed

Common Questions

Organization owners and admins can view audit logs. On Sim Cloud, you must be on the Enterprise plan.
Audit log entries are append-only and cannot be modified or deleted through the Sim interface or API. They represent a reliable record of actions taken in your organization.
Yes. Use the API to export logs programmatically. Paginate through all records using the cursor parameter and store them in your own data warehouse or SIEM.
Audit logs are scoped to your organization and include activity across all workspaces within it. You can filter by workspaceId to narrow results to a specific workspace.
Each entry includes the event type, a description, the actor's name and email, the affected resource, the workspace, and a timestamp. IP addresses and user agents are not exposed through the API.
Yes. Pass the actorId query parameter to filter logs by a specific user. The actor must be a current or former member of your organization.

Self-hosted setup

Self-hosted deployments use environment variables instead of the billing/plan check.

Environment variables

AUDIT_LOGS_ENABLED=true
NEXT_PUBLIC_AUDIT_LOGS_ENABLED=true

Once enabled, audit logs are viewable in Settings → Enterprise → Audit Logs and accessible via the API.

On this page