Log Access & Audit Trail Requests

Log Access & Audit Trail Requests

Logs are records of what has happened within your system — who accessed it, what actions were taken, what errors occurred, and what changed. This article explains how to access logs and audit trails.

Types of Logs

  • Application logs: Errors, warnings, and informational messages from your application code
  • Access logs: Records of HTTP requests to your web server (IP addresses, paths, response codes)
  • Database audit logs: Queries executed, records modified (if audit logging is enabled in your database)
  • Authentication logs: Login successes and failures
  • Infrastructure logs: Server events, service start/stop, resource alerts
  • Deployment logs: Record of every code deployment, who triggered it, and the outcome

How to Request Logs

Raise a support ticket with:

  • The type of log required
  • The date and time range (be as specific as possible)
  • The reason for the request (audit, investigation, legal, etc.)

We will extract the relevant logs and provide them in a readable format (typically plain text or CSV). Allow 1–2 business days for log extraction requests.

Retention

Log retention periods vary by type. Application and access logs are typically retained for 30–90 days. For compliance-sensitive environments (e.g. financial services, healthcare), we can configure extended retention — discuss this with your Project Manager during setup.

Real-Time Log Access

For some managed services clients, we can provide direct read-only access to log aggregation tools (e.g. Datadog, Grafana Loki, Papertrail). This is configured during onboarding for clients who need it. Contact your Account Manager to set this up.

Did you find this article useful?