Audit log
The audit log records all committed data mutations in the system. It provides a transaction-consistent, immutable history of changes for audit, compliance, and operational analysis.
The audit log is append-only and cannot be modified retroactively.
What the audit log is
The audit log is a system-managed record of every committed insert, update, and delete operation.
It records mutations across:
- custom domain tables
- system-managed tables
Each entry represents a single column-level change that was part of a committed database transaction.
Recorded event types
The audit log records the following mutation types:
INSERTUPDATEDELETE
All mutations are logged without exception. There are no internal operations or background processes that bypass audit logging.
Field reference
Each audit log entry includes the following fields:
| Field | Meaning |
|---|---|
| Transaction | Identifier of the database transaction that committed the change |
| Inserted | Timestamp when the mutation was committed |
| Table | Table in which the change occurred |
| Row | Internal id of the affected row |
| Operation | Type of mutation: INSERT, UPDATE, or DELETE |
| User | Authenticated user who performed the change |
| Column | Column that was modified |
| From | Previous value |
| To | New value |
Updates are recorded at column granularity. Only columns whose values change produce audit log entries.
Transaction scope
All mutations that occur within the same database transaction share the same transaction identifier.
This applies even when:
- multiple rows are modified
- multiple tables are affected
This makes it possible to reconstruct the full scope of a logical change deterministically.
Logging and visibility timing
Audit logging is handled asynchronously.
This means:
- audit entries may appear with a short delay
- transactional correctness of the data is not affected
- no committed mutation is skipped or reordered
The delay affects visibility only, not consistency.
Retention and access
Audit log entries are retained for a time-bounded period.
Retention duration is defined by the system and is not configurable per user.
Access to the audit log is restricted to:
- system administrators
Non-administrative users cannot view audit log data through the UI or API.
Related resources
Related concepts