Activity Log

The Activity Log is a powerful security and auditing tool that provides a detailed, chronological record of actions performed on key business objects within the system.

The Activity Log is a powerful security and auditing tool that provides a detailed, chronological record of actions performed on key business objects within the system. It is designed to give you a clear understanding of data workflows, enhance security by tracking user activity, and simplify troubleshooting.

By tracking who did what and when, you can maintain a complete and immutable audit trail for compliance, operational management, and internal controls.

Key Use Cases and Benefits

The Activity Log is more than just a record of events; it’s a critical tool for maintaining data integrity and security. Here are some practical ways you can use it:

  • Accelerate Troubleshooting: When a customer reports an unexpected change to their subscription or an invoice appears incorrect, the Activity Log is your first place to look. You can filter the log by the specific Customer or Subscription ID to see a full history of changes, pinpointing exactly who made the change, what was altered, and when.
  • Strengthen Security and Compliance: For financial audits (like SOX compliance), you must demonstrate control over who can modify sensitive information. The Activity Log provides an immutable record of all changes to critical objects like Products, Plans, and Invoices. You can easily export this data to prove that your internal controls are working effectively.
  • Monitor User Activity: Keep an eye on actions performed by specific users, especially those with high-level permissions. This helps ensure that all actions are authorized and aligns with company policies.

Scope of the Activity Log

The Activity Log is designed to be comprehensive, but it’s important to understand what is and isn’t tracked.

What is Logged?

The log captures significant business events, primarily focusing on Create, Read, Update, and Delete (CRUD) actions for key business objects that you configure. This includes:

  • Changes made by users through the GUI.
  • Changes made via API calls.
  • Significant system events (e.g., plan transitions).

What is Not Logged?

The Activity Log does not track:

  • Every single API call, especially those that only read data without making changes (unless Read is explicitly configured for tracking).
  • Internal system processes that do not directly relate to a change in a business object.

Configuring the Activity Log

You have full control over which actions are tracked for specific business objects. This allows you to focus on logging the most critical data for your business needs. The configuration is managed in the Business Configuration section.

How to Add a New Log Configuration

  1. Navigate to Business Configuration > Activity log from the main menu.

  2. Click the + Activity log button in the top-right corner.

  3. In the Add activity log dialog:

    • Type: Select the category of the object. In most cases, this will be Entity.
    • Target: Choose the specific business object to monitor (e.g., Customer, Subscription, Plan).
    • Actions: Select the actions you want to log (Create, Read, Update, Delete).
  4. Click Submit to save the configuration. The system will immediately begin logging the actions you specified.

Configuring the Activity Log

Best Practices for Configuration

  • Be Specific: Avoid logging everything. Focus on the objects and actions that are most critical for your security, compliance, and operational needs. Logging Update and Delete actions on financial objects is a great starting point.
  • Avoid Excessive Read Logging: Tracking Read actions can generate a very high volume of data and may slow down system performance. Only enable this if you have a specific security requirement to monitor who is viewing sensitive data.
  • Regularly Review: Periodically review your log configurations to ensure they are still aligned with your business needs.

Viewing and Investigating Logs

Once configured, the system generates log entries that you can view, filter, and export.

How to View and Filter Logs

Configuring the Activity Log

  1. Navigate to the log viewer screen (e.g., Users > Activity Logs).
  2. You will see a list of all captured events, sorted by date.
  3. Use the powerful filtering options to investigate specific events:
    • Date Range: Narrow your search to a specific time period.
    • Target Object and ID: Filter for a specific object (e.g., Customer) and even a specific instance (e.g., Customer ID).
    • User: See all actions performed by a specific user.
    • Action Type: Isolate all Create or Delete actions.

Understanding the Log Data

Each log entry contains detailed information to help you understand the event:

ColumnDescription
Created onThe exact date and time the action occurred.
IP AddressThe IP Address of user who performed the action.
UserThe user who performed the action. This may show “System” for automated processes.
TargetThe type of business object that was affected (e.g., Subscription).
Target IDThe unique identifier of the specific object that was changed.
ActionThe action performed (CREATE, UPDATE, DELETE).
DetailsA human-readable summary of the change. For UPDATE actions, this will show the old and new values for the fields that were modified.

Exporting Log Data

You can export your filtered log view for offline analysis, archival, or audit requests. Click the More button to download the data, typically in CSV format, which can be opened in any spreadsheet application.

Permissions and Data Retention

  • Permissions: Access to configure and view the Activity Log is controlled by user permissions. Typically, only administrative users have the ability to change log configurations, while other users may have view-only access.
  • Data Retention: Activity Log data is retained for a specific period to comply with audit and security standards. Please refer to your service agreement for the exact data retention policy.