Skip to content

Audit Log

The Audit Log provides a complete record of actions taken within your LakeSentry organization. Every significant action — from rule changes to action plan approvals to user management — is logged with the user who performed it, when it happened, and what changed. This is your accountability record for compliance, troubleshooting, and governance.

The main view shows audit events in reverse chronological order:

ColumnWhat it shows
TimeWhen the event occurred
ActorWho performed the action (email address, or actor type for system actions)
ActionWhat was done (e.g., “attribution rule create”, “action plan approve”)
ResourceWhat was affected (resource type and truncated ID)
IP AddressOrigin IP address of the request

You can filter the log by action type using the dropdown at the top of the page. Available filter options include login, plan approved, plan rejected, insight suppressed, connector created, and connector updated. Use the Clear filter link to return to the full log.

LakeSentry logs the following categories of actions:

ActionWhat it records
Rule createdNew attribution rule — includes name, rule type, workspace, and priority
Rule updatedChanges to an existing rule — includes the updated field values (e.g., name, priority, is_active)
Rule deletedRule removal
Rule reorderedPriority change — includes the new priority value

Activation and deactivation of rules are recorded as rule updates with the is_active field in the details.

Attribution rule changes are among the most important audit events — a rule change can shift cost attribution across your entire organization.

ActionWhat it records
Action approvedWho approved the action and what it will do
Action rejectedWho rejected and optionally why
ActionWhat it records
Budget createdScope, amount, period, and thresholds
Budget updatedWhat changed (amount, thresholds, recipients)
Budget deletedEntity type, entity ID, and budget amount at deletion time
ActionWhat it records
User invitedInvitee email and assigned role
Invitation acceptedWho accepted and the resulting user account
Invitation revokedWhich invitation was revoked
User removedWho was removed and by whom
Ownership transferredPrevious and new owner
ActionWhat it records
Hierarchy changeOrg unit, department, or team group created/updated/deleted
Connector changeAccount or region connector created/updated/deleted
ActionWhat it records
Webhook createdEndpoint URL
Webhook updatedConfiguration changes
Webhook deletedWhich webhook was removed

Each audit event stores the following data in the database:

  • Action details — A JSON payload with action-specific context (e.g., changed field values, entity information)
  • Request metadata — IP address and user agent of the originating request

The IP address is visible in the table view. The full details payload and user agent are stored in the database for programmatic access.

  1. Filter the audit log by action to find attribution rule changes.
  2. Review the log entries around the time the change was noticed.
  3. Look for rules that were created, modified, or deleted.
  4. If a change was incorrect, use the logged details to create a correcting rule.
  1. Use the action filter to select “Plan Approved” or “Plan Rejected”.
  2. Review the entries to see who approved or rejected actions and why.
  3. Cross-reference with the Insights & Actions execution history for execution details.
  1. Page through the audit log to review the audit period.
  2. Key areas to check:
    • Who has admin access and what actions they’ve taken
    • What action plans were approved or rejected
    • What changes were made to attribution rules and budgets
    • What connector and webhook configuration changes were made
  1. Identify when the unexpected behavior started.
  2. Page through the audit log to find entries around that time.
  3. Look for any changes that coincide — rule changes, connector updates, or hierarchy modifications.
  4. Check the Insights & Actions execution history for automated processes that may have triggered the change.