Skip to main content

Audit Trail (Exportable Events Log)

Everything you need to now about audit trail on Layer workspace

Updated this week

Overview

The Audit Trail provides a complete, time-stamped record of all key actions taken across your Layer workspace. It helps your team maintain transparency, meet compliance requirements, and easily investigate activity across projects and users.

Layer automatically logs all important events from asset creation, editing, style trainings, workflow runs to user management and workspace changes - in one centralized, immutable record.


Why It Matters

  • Accountability: See exactly who did what and when.

  • Compliance: Supports SOC 2 and enterprise governance needs.

  • Security: Identify unauthorized or unusual activity quickly.

  • Transparency: Give admins and auditors a clear view of workspace history.


What’s Tracked

Layer logs actions in the following categories:

Category

Example Events

Authentication

Logins, SSO sessions, failed sign-ins

User Management

User invited, removed, reactivated or role changed

Workspace Settings

Policy updates, integrations enabled/disabled

Asset Activity

Image or video created, updated, deleted

Workflow Runs

Model trainings started, completed, failed

API & Integrations

API token created, rotated, or revoked

Billing

Plan upgraded, quota adjusted, overage alert triggered


Event Details

Each audit log entry includes the following data:

Field

Description

event_id

Unique event identifier

timestamp

UTC time of the event

actor

User or system that performed the action

action

The event type (e.g. asset.created, user.role_updated)

target

The object affected (asset, user, workspace, etc.)

workspace_id

Associated workspace or organization

details

Context (parameters, before/after states)

source

Origin (UI, API, integration)

Sensitive information like passwords or API secrets are never recorded in event details.


Viewing the Audit Trail

You can view and filter audit logs directly within Layer:

  • Workspace → Activity → Events
    Displays a chronological list of all workspace activity.

  • Filters: by date range, actor, event type, or resource.

  • Search: by user, asset, or workflow ID.

  • Per-object history: asset and workflow pages include scoped “Activity” tabs.

Admins can export the full audit history as CSV


Access & Permissions

  • Admins can view all workspace activity.

  • Members can view logs related to their own assets or workflows.

  • Audit Trail records are read-only and immutable - they cannot be edited or deleted.


Data Retention

  • Audit logs are retained forever by default.

  • Enterprise plans can request custom retention periods or external export for compliance.


API Access

Developers can programmatically retrieve audit logs via the Audit Trail API.

Example request:

GET /api/v1/audit?workspace_id=abc123&action=asset.created

Response:

{   "event_id": "evt_12fj39",   "timestamp": "2025-10-25T14:35:22Z",   "actor": "[email protected]",   "action": "asset.created",   "target": { "type": "asset", "id": "img_948e2f" },   "details": { "model": "Flux Dev", "resolution": "1024x1024" } }

Integrations

Audit Trail data can be exported or forwarded to third-party tools such as:

  • SIEM systems (Splunk, Datadog, Elastic)

  • Monitoring dashboards

  • Security compliance platforms


Notes for Enterprise Users

  • Audit Trail forms part of Layer’s SOC 2 Type II compliance program.

  • All logs are timestamped, immutable, and stored in encrypted databases.

  • Admins can contact support for custom exports or compliance evidence packages.

Did this answer your question?