Skip to content

Audit Log

The Audit Log tracks every administrative action across the Watchgrid platform, providing a complete trail of who did what and when.


Viewing the Audit Log

Go to System → Audit Log to browse all recorded events.

Filters

  • Tenant Filter — (super-admin only) filter events by tenant
  • Action Type — filter by specific action (dropdown populated dynamically):
  • user_create, user_delete
  • device_delete, device_unlock
  • tenant_create, tenant_delete
  • dns_create, dns_delete
  • password_change
  • token_regenerate
  • And more as features are used
  • Limit — show 50, 100, 250, or 500 events
  • Refresh — reload the log
  • Clear Filters — reset all filters

Events Table

Column Description
Timestamp When the action occurred
Admin User Who performed the action
Action Color-coded action type badge
Resource The affected resource (device ID, username, tenant, etc.)
Details Additional context about the action

Events are sorted newest-first.


What Gets Logged

All administrative actions are recorded, including:

  • User creation, deletion, and password changes
  • Device approval, deletion, and tenant unlocking
  • Tenant creation and deletion
  • DNS record changes
  • SSH certificate issuance and revocation
  • Provisioning profile changes
  • License activation and revocation
  • Token regeneration