Log Access & Audit Trail Requests
Logs are records of what has happened within your system — who accessed it, what actions were taken, what errors occurred, and what changed. This article explains how to access logs and audit trails.
Types of Logs
- Application logs: Errors, warnings, and informational messages from your application code
- Access logs: Records of HTTP requests to your web server (IP addresses, paths, response codes)
- Database audit logs: Queries executed, records modified (if audit logging is enabled in your database)
- Authentication logs: Login successes and failures
- Infrastructure logs: Server events, service start/stop, resource alerts
- Deployment logs: Record of every code deployment, who triggered it, and the outcome
How to Request Logs
Raise a support ticket with:
- The type of log required
- The date and time range (be as specific as possible)
- The reason for the request (audit, investigation, legal, etc.)
We will extract the relevant logs and provide them in a readable format (typically plain text or CSV). Allow 1–2 business days for log extraction requests.
Retention
Log retention periods vary by type. Application and access logs are typically retained for 30–90 days. For compliance-sensitive environments (e.g. financial services, healthcare), we can configure extended retention — discuss this with your Project Manager during setup.
Real-Time Log Access
For some managed services clients, we can provide direct read-only access to log aggregation tools (e.g. Datadog, Grafana Loki, Papertrail). This is configured during onboarding for clients who need it. Contact your Account Manager to set this up.