Audit Logs
Track all activity in your organization with comprehensive audit logging for security and compliance.
Overview
Jasper maintains detailed audit logs of all significant actions within your organization. This helps you:
- Monitor team activity and code review usage
- Track security-related events like logins and role changes
- Meet compliance requirements with detailed audit trails
- Investigate issues by reviewing historical actions
Audit Categories
Events are organized into logical categories for easy filtering:
Authentication
Track who accesses your organization:
- Login - User signed in via GitHub OAuth
- Logout - User signed out
- OAuth Refresh - GitHub token was refreshed
- Failed Login - Unsuccessful login attempt (recorded with reason)
Code Reviews
Monitor all review activity:
- Triggered - Review started (automatic or manual)
- Completed - Review finished successfully
- Failed - Review encountered an error
- Manual Trigger - User manually requested a review
Billing
Track credit usage and purchases:
- Credits Used - Credits consumed by a review
- Purchase - Credit package purchased
- Refund - Credits refunded
- Free Tier Reset - Monthly free credits added
Team
Monitor team membership changes:
- Invite Sent - New member invited
- Member Joined - User accepted invitation
- Role Changed - Member's role was updated
- Member Removed - User left or was removed
Settings
Track configuration changes:
- Profile Update - User profile modified
- Preference Update - Notification or display preferences changed
- Integration Update - Slack/Discord/Teams webhook configured
- Org Settings Update - Organization settings modified
Access
Detailed access tracking (optional):
- Page View - Dashboard page accessed
- API Call - API endpoint used
- Export - Data exported from the system
Viewing Audit Logs
Personal Audit Logs
View your own activity:
- Click your profile icon in the top right
- Select Personal Settings
- Navigate to the Audit Logs tab
Organization Audit Logs
Admins and owners can view all organization activity:
- Go to Settings → Organization
- Select the Audit Log tab
- Use filters to narrow down events
Filtering & Search
Find specific events using the available filters:
- Category - Filter by event category (auth, billing, team, etc.)
- Date Range - Select start and end dates
- User - Filter by specific team member
- Detailed Mode - Toggle to show all events including page views
Log Entry Details
Each audit log entry contains:
| Field | Description |
|---|---|
| Timestamp | When the event occurred (in your timezone) |
| User | Who performed the action |
| Category | Event category (auth, review, billing, etc.) |
| Action | Specific action taken |
| Description | Human-readable event description |
| IP Address | Source IP of the request |
| Changes | Old/new values for settings changes |
Data Retention
Audit log retention varies by plan:
- Free Tier - 30 days
- Paid Plans - 90 days
- Enterprise - Custom retention (up to 2 years)
Need longer retention? Contact sales for enterprise options.
Exporting Logs
Export audit logs for compliance or analysis:
- Apply desired filters
- Click the Export button
- Choose format (CSV or JSON)
- Download the file
Exports are logged as audit events themselves for traceability.
API Access
Access audit logs programmatically:
# Get audit logs
GET /api/v1/organizations/{org}/audit-logs
# Query parameters
?category=auth
&from=2024-01-01
&to=2024-01-31
&per_page=100
See the API Documentation for full details.
Security Monitoring
Use audit logs to monitor for security issues:
Security Best Practices
- Review failed login attempts regularly
- Monitor role changes for unauthorized escalation
- Check for unexpected API access patterns
- Set up webhook notifications for critical events
Real-Time Alerts
For real-time security monitoring, configure webhooks to receive instant notifications for specific audit events. This enables integration with your existing security monitoring tools.
Privacy & Compliance
Jasper's audit logging is designed with privacy in mind:
- Sensitive data redaction - Passwords, tokens, and secrets are never logged
- GDPR compliance - Logs can be exported and deleted per user request
- SOC 2 ready - Audit trails meet SOC 2 requirements
- Access controls - Only admins can view organization-wide logs