Skip to main content

Audit Logs

Audit logs provide a comprehensive record of all actions taken in your Crew workspace. Use them for security monitoring, compliance requirements, and troubleshooting.
Full audit log access is available on Professional and Enterprise plans.

What’s Logged

Authentication Events

EventDescription
auth.login.successSuccessful login
auth.login.failureFailed login attempt
auth.logoutUser logged out
auth.mfa.enabledMFA enabled for user
auth.mfa.disabledMFA disabled for user
auth.password.changedPassword changed
auth.password.resetPassword reset requested
auth.session.expiredSession timed out

User Management

EventDescription
user.createdNew user added
user.updatedUser details changed
user.deletedUser removed
user.role.changedUser role modified
user.invitedInvitation sent
user.invitation.acceptedUser accepted invite

API Access

EventDescription
api_key.createdNew API key created
api_key.revokedAPI key deleted
api_key.usedAPI key used (sampled)
api.requestAPI request made (sampled)

Configuration Changes

EventDescription
agent.createdAgent created
agent.updatedAgent configuration changed
agent.deletedAgent deleted
pathway.createdPathway created
pathway.updatedPathway modified
pathway.deletedPathway deleted
webhook.createdWebhook configured
webhook.updatedWebhook modified
webhook.deletedWebhook removed
settings.updatedWorkspace settings changed

Data Access

EventDescription
call.viewedCall details accessed
transcript.viewedTranscript accessed
recording.accessedRecording downloaded/played
export.createdData export requested
export.downloadedExport downloaded

Telephony Events

EventDescription
call.initiatedOutbound call placed
call.answeredCall connected
call.endedCall terminated
call.transferredCall transferred
sms.sentSMS sent

Log Format

Structure

{
  "id": "log_abc123xyz",
  "timestamp": "2024-01-15T10:30:00.000Z",
  "event_type": "agent.updated",
  "actor": {
    "type": "user",
    "id": "user_12345",
    "email": "admin@company.com",
    "ip_address": "203.0.113.10",
    "user_agent": "Mozilla/5.0..."
  },
  "resource": {
    "type": "agent",
    "id": "agent_sarah",
    "name": "Sarah"
  },
  "action": "update",
  "changes": {
    "persona.greeting": {
      "old": "Hello, how can I help?",
      "new": "Thank you for calling, how can I help?"
    }
  },
  "metadata": {
    "workspace_id": "ws_xyz789",
    "crew_id": "crew_abc123"
  }
}

Fields

FieldDescription
idUnique log entry ID
timestampWhen the event occurred (ISO 8601)
event_typeType of event
actorWho performed the action
resourceWhat was affected
actionThe action taken
changesBefore/after values (if applicable)
metadataAdditional context

Accessing Logs

Dashboard

View logs in the dashboard:
  1. Go to SettingsAudit Logs
  2. Filter by date, event type, or actor
  3. Search for specific entries
  4. Export for analysis

API

Query logs programmatically:
curl "https://api.usecrew.ai/v1/audit-logs" \
  -H "Authorization: Bearer YOUR_API_KEY"

Filtering

# By event type
curl "https://api.usecrew.ai/v1/audit-logs?event_type=auth.login.failure" \
  -H "Authorization: Bearer YOUR_API_KEY"

# By date range
curl "https://api.usecrew.ai/v1/audit-logs?start=2024-01-01&end=2024-01-31" \
  -H "Authorization: Bearer YOUR_API_KEY"

# By actor
curl "https://api.usecrew.ai/v1/audit-logs?actor_email=admin@company.com" \
  -H "Authorization: Bearer YOUR_API_KEY"

# By resource
curl "https://api.usecrew.ai/v1/audit-logs?resource_type=agent&resource_id=agent_sarah" \
  -H "Authorization: Bearer YOUR_API_KEY"

Pagination

curl "https://api.usecrew.ai/v1/audit-logs?limit=100&offset=200" \
  -H "Authorization: Bearer YOUR_API_KEY"

Exporting Logs

CSV Export

curl -X POST "https://api.usecrew.ai/v1/audit-logs/export" \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -d '{
    "format": "csv",
    "start_date": "2024-01-01",
    "end_date": "2024-01-31",
    "event_types": ["auth.*", "agent.*"]
  }'

JSON Export

curl -X POST "https://api.usecrew.ai/v1/audit-logs/export" \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -d '{
    "format": "json",
    "start_date": "2024-01-01",
    "end_date": "2024-01-31"
  }'

SIEM Integration

Forward logs to your SIEM:
{
  "log_forwarding": {
    "enabled": true,
    "destination": "https://your-siem.com/api/logs",
    "format": "json",
    "auth": {
      "type": "bearer",
      "token": "your_siem_token"
    },
    "events": ["auth.*", "api_key.*", "user.*"]
  }
}
Supported SIEM platforms:
  • Splunk
  • Datadog
  • Sumo Logic
  • Custom webhook

Retention

Default Retention

PlanRetention Period
Starter30 days
Professional90 days
Enterprise365 days (configurable)

Extended Retention

Enterprise customers can configure:
{
  "audit_log_retention": {
    "days": 730,
    "archive_to": "s3://your-bucket/audit-logs"
  }
}

Alerting

Security Alerts

Configure alerts for suspicious activity:
{
  "alerts": [
    {
      "name": "Multiple Failed Logins",
      "condition": {
        "event_type": "auth.login.failure",
        "count": 5,
        "window_minutes": 10
      },
      "action": {
        "type": "email",
        "recipients": ["security@company.com"]
      }
    },
    {
      "name": "API Key Created",
      "condition": {
        "event_type": "api_key.created"
      },
      "action": {
        "type": "webhook",
        "url": "https://your-siem.com/alerts"
      }
    }
  ]
}

Alert Channels

ChannelConfiguration
EmailRecipient addresses
WebhookEndpoint URL
SlackWebhook URL
PagerDutyIntegration key

Use Cases

Security Monitoring

Track suspicious authentication patterns:
# Failed logins in last 24 hours
curl "https://api.usecrew.ai/v1/audit-logs?event_type=auth.login.failure&start=-24h" \
  -H "Authorization: Bearer YOUR_API_KEY"

Compliance Auditing

Document access to sensitive data:
# All recording access
curl "https://api.usecrew.ai/v1/audit-logs?event_type=recording.accessed&start=2024-01-01" \
  -H "Authorization: Bearer YOUR_API_KEY"

Change Tracking

Review configuration changes:
# Agent configuration changes
curl "https://api.usecrew.ai/v1/audit-logs?resource_type=agent&action=update" \
  -H "Authorization: Bearer YOUR_API_KEY"

User Activity

Investigate user actions:
# All actions by specific user
curl "https://api.usecrew.ai/v1/audit-logs?actor_email=user@company.com" \
  -H "Authorization: Bearer YOUR_API_KEY"

Log Integrity

Immutability

Audit logs are immutable:
  • Cannot be modified after creation
  • Cannot be deleted (except by retention policy)
  • Attempts to tamper are logged

Verification

Enterprise customers can request:
  • Cryptographic log verification
  • Third-party audit attestation
  • Log integrity reports

Best Practices

Schedule weekly or monthly log reviews for security.
Configure alerts for critical security events.
Export logs before retention expiration if needed.
Forward logs to your security monitoring platform.
Use logs to demonstrate compliance.

Next Steps