NextFSM

Audit Log

View system activity and change history

Track all changes made in the system. Admin only.

Log Entry Fields

Each entry shows:

  • Timestamp - When the change occurred
  • User - Who made the change (name and email)
  • Action - Create, Update, or Delete
  • Entity - Record type (customer, work_order, contract, etc.)
  • Entity Name - Specific record identifier
  • Changes - Field-by-field old and new values

Filtering

Time Period

  • Today
  • This Week
  • This Month
  • Last Month
  • All Time

Entity Type

Filter by record type:

  • Customer
  • Work Order
  • Contract
  • Device
  • Invoice
  • User
  • Organization
  • And more...

Action

  • Create
  • Update
  • Delete

Search across all fields including user name, entity name, and changed values.

Example Entries

Customer Update

Action: update
Entity: customer - Acme Corporation
User: John Admin (john@company.com)
Time: 21.12.2024, 14:30:00

Changes:
  phone: "+372 5551234" -> "+372 5559999"
  notes: null -> "Preferred contact: email"

Work Order Created

Action: create
Entity: work_order - WO-2024-0542
User: Jane Dispatcher (jane@company.com)
Time: 21.12.2024, 09:15:00

Data:
  customer: Acme Corporation
  priority: P2
  description: "HVAC maintenance"

Contract Deleted

Action: delete
Entity: contract - CONTRACT-2024-015
User: John Admin (john@company.com)
Time: 20.12.2024, 16:45:00

Deleted data:
  name: "Annual Maintenance"
  customer: Beta Industries
  value: 12000

Viewing Details

Click any log entry to expand:

  • Full change details
  • All fields affected
  • Before/after values for updates
  • Complete record data for creates/deletes

Excluded Entities

High-frequency updates are not logged to reduce noise:

  • User last_seen_at (updates on every page view)
  • Notifications
  • Time logs
  • Route optimization jobs
  • Stock moves

Data Retention

Audit logs are retained indefinitely. No automatic cleanup.

Export

Currently view-only. Export functionality planned for future release.

Use Cases

Security Review:

  • Track who accessed sensitive data
  • Identify unauthorized changes
  • Review admin actions

Troubleshooting:

  • Find when a record was changed
  • Identify who made the change
  • See what the previous value was

Compliance:

  • Demonstrate change tracking
  • Provide audit trail for regulators
  • Document data handling

On this page

Audit Log