Skip to content

Audit Log

This page will explain the functionality of the “Audit Log”.

Understanding the Log

  • What kind of events are captured in the log.
  • A description of each column: Time, User, Operation (Insert, Update, Delete), Table, and ID.
  • How this log can be used for security, debugging, and compliance purposes.

Using the Log Interface

  • How to navigate the log.
  • (If applicable) How to use any search or filter functionalities.
  • Explanation of the context menu for each log entry.