Audit Logs
Every action in Lexic is recorded. Know exactly what happened, when it happened, and who did it. Compliance-ready from day one.
How do I track what happened?
Lexic's audit logging system captures 50+ event types across every layer of your organization. Each log entry includes full context: who performed the action, what changed, when it happened, and the complete before/after state.
Enterprise-grade: Audit logs are protected by Row-Level Security (RLS), ensuring tenant isolation. You can only view logs for resources you have access to.
Event Categories
Lexic tracks actions across ten major categories. Each event includes full metadata for investigation and compliance.
Authentication
User Management
Organization
Lexicon & Workspace
Content
AI Operations
Security
Billing & Words
Data & System Operations
Severity Levels
Every audit event is assigned a severity level for prioritization and alerting.
| Level | Examples |
|---|---|
| LOW | Read operations, searches, viewing notes, listing resources |
| MEDIUM | Updates, creates, note editing, workspace modifications |
| HIGH | Deletes, permission changes, role modifications, sharing updates |
| CRITICAL | Security events, data exports, unauthorized access attempts, bulk operations |
Audit Log Data
Each audit log entry captures comprehensive context for investigation and compliance requirements.
Before/After State (JSONB)
Full snapshots of the resource before and after the action. Perfect for understanding exactly what changed and enabling rollback decisions.
Trace IDs
Request correlation IDs that link related operations. Trace a single user action across multiple service calls and database operations.
Client Context
IP address, user agent, and request origin. Know not just who did something, but from where and how.
Timestamp with Timezone
Precise UTC timestamps with timezone information. Critical for global teams and compliance audits across jurisdictions.
{
Β Β "event": "note.updated",
Β Β "severity": "MEDIUM",
Β Β "actor_id": "user_abc123",
Β Β "resource_id": "note_xyz789",
Β Β "trace_id": "req_1234567890",
Β Β "ip_address": "192.168.1.1",
Β Β "user_agent": "Mozilla/5.0 ...",
Β Β "before_state": { ... },
Β Β "after_state": { ... },
Β Β "timestamp": "2024-01-15T10:30:00Z"
}
Query Filters
Find exactly what you're looking for with powerful filtering options.
By Scope
- β’Lexicon
- β’Organization
- β’Workspace
- β’Canvas
By User
- β’Filter by actor (who did it)
- β’Filter by affected user
- β’Filter by role
By Action Type
- β’Event category (auth, content, etc.)
- β’Specific event type
- β’Severity level
By Date Range
- β’Start and end timestamps
- β’Relative ranges (last 7 days, etc.)
- β’Timezone-aware filtering
Compliance Features
Built for enterprise compliance requirements from day one.
RLS-Enforced Tenant Isolation
Row-Level Security ensures complete data isolation. Users can only access audit logs for resources they have permission to view. Even database administrators cannot bypass these restrictions.
Multi-Record Operation Support
Bulk operations (batch deletes, imports, etc.) generate individual audit records for each affected resource, linked by a common trace ID. Full accountability even at scale.
Error Code Tracking
Failed operations are logged with detailed error codes and context. Track not just what succeeded, but what was attempted and why it failed.
Enterprise-Ready Audit Infrastructure
Lexic's audit logging is designed to meet the requirements of SOC 2, GDPR, and other compliance frameworks. Complete visibility into every action, with the controls needed for regulated industries.
- βImmutable audit trail
- βConfigurable retention policies
- βExport capability for external SIEM integration
- βReal-time alerting on critical events