Event Logs

Comprehensive Audit Trail for Your Workspace


Event Logs provide a complete, time-stamped history of key actions in your Kinabase workspace - such as user sign-ins, field

changes, or the creation and deletion of records .

Kinabase makes it easy for admins and auditors to review system activity

and ensure compliance with internal standards and external regulations.


Using Event Logs

  • Perfect for industries requiring traceability (e.g., ISO 9001). Event logs record who made changes and when.
  • Track user sign-ins and sign-outs, plus changes to collections or fields.
  • Quickly identify the source of unexpected data alterations or deleted records.
  • Provides a clear record of major system events for managers or stakeholders.

Accessing the Event Log

  1. Open Settings

    • Click your name or the settings cog at the bottom-left corner in Kinabase's main interface.
  2. Go to 'System'

    • In the Settings menu, find the System section.
  3. Select 'Event Log'

    • This opens the chronological view of significant events in your workspace.

Only System Admins or users with the right permissions

can see the Event Log.


Understanding the Event Log Timeline

Event Timestamp

Events are listed in reverse chronological order (most recent first) with exact date and time.

Event Type

Descriptions like 'User Successful Sign In', 'Collection Field Updated', or 'Record Deleted'.

User Details

gives a broad picture of deadlines, events, or busy periods.

Collection & Field

Identifies which collection or field was changed, if applicable.

For example:
“USER SUCCESSFUL SIGN IN” might list the user’s name, IP address, and browser agent.
“COLLECTION FIELD ADDED” could detail which collection was modified and by whom.


Common Uses

  1. Security Audits

    • Confirm only authorised personnel accessed the system, or see if there were suspicious sign-ins.
  2. Change Tracking

    • Identify who altered a field or record, plus the old and new values if recorded.
  3. Compliance

    • Provide regulators or auditors with a fully documented timeline of changes across your workspace.

Tips

Restrict event log access to only those who need it, ensuring system-wide security.

For day-to-day operational tracking, Activities provide a timeline within each record, while the Event Log offers a higher-level, system-wide view.

Check the event log periodically (e.g., weekly or monthly) for anomalies.


Utilising the Event Logs gives you a powerful audit trail that underpins security, accountability, and regulatory compliance.

If you need additional logging features or advanced filtering, contact your System Admin or visit our Help & Support for more information.