Logs
The Logs page provides centralized visibility into system activity, security events, and technical issues across the platform.
It helps monitor user behavior, track authentication activity, detect potential security risks, and troubleshoot integration or system errors.
Overview
Logs provide operational insight and help identify both security-related and technical issues across the system.
Log Types
Audit Logs
Audit Logs record user and system actions related to authentication and access.
They are primarily used for monitoring system security, tracking user activity, and supporting compliance and auditing processes.
Audit logs capture events such as login attempts (successful and failed), along with relevant details including user identifiers, timestamps, and request origin when available.
Audit logs help track who accessed the system, when the access occurred, and whether the action was successful or failed.
Threat Logs
Threat Logs provide technical visibility into errors and issues that occur during SDK or API usage.
They are designed to help identify integration issues, troubleshoot unexpected failures, and monitor error trends across different versions and environments.
Threat logs capture information such as error type, error message, source (SDK or API), version details, and timestamps.
They are typically generated when system errors occur, such as failed API requests, SDK runtime issues, or validation failures during integration.
Threat logs are essential for debugging and improving integration stability across applications.
Access & Permissions
Access to logs is restricted based on user roles and permissions.
Important Notes
Key NotesLogs are read-only and cannot be modified.
Historical logs are retained for auditing purposes.
Threat logs do not expose sensitive customer data.
Log timestamps reflect system time.
Updated 3 days ago