Skip to main content

Activity Logs

What it is

Activity Logs is BotBat's system-wide audit trail that captures every significant event across the platform. This includes API calls with full request and response details, user actions (logins, configuration changes, campaign launches), system events (scheduled jobs, automated workflow executions), and webhook deliveries with their response codes and retry history. The module provides a complete, tamper-evident record of what happened, who did it, and when.

The log feed supports powerful filtering, full-text search, and real-time streaming for live monitoring. Whether you are investigating an incident, debugging an API integration, or preparing a compliance export, Activity Logs gives you the raw data you need in a searchable, structured format. Every log entry links back to the relevant module and resource, making it easy to jump from a log event to the actual campaign, contact, or configuration that was affected.

Log retention periods vary by plan. Starter plans retain logs for 30 days, Growth plans for 90 days, and Enterprise plans for one year. For organizations with long-term retention requirements, the export feature lets you download filtered log data as CSV or JSON on a schedule you control.

When to use

ScenarioWhy Activity Logs helps
Investigating an incidentTrace exactly what occurred, who triggered it, and when. For example, find out which user launched a campaign to the wrong segment and what configuration was active at the time.
Debugging API integrationsFilter for API call logs to inspect full request and response payloads, HTTP status codes, headers, and response times.
Monitoring webhook deliveriesVerify that webhook events were delivered successfully, inspect response codes from your endpoint, and identify retries or persistent failures.
Compliance and auditingExport logs for a specific date range to satisfy internal audit requirements, regulatory compliance (GDPR data access logs, SOC 2 evidence), or security reviews.
Real-time operational monitoringStream logs live during campaign launches or high-traffic periods to watch system activity as it happens and catch anomalies immediately.

Log event types

Event typeWhat it capturesExample
API CallHTTP method, URL, request/response headers and body, status code, latencyPOST /api/v1/campaigns/launch returned 200 in 342ms
User ActionActor, action performed, module, resource ID, before/after stateUser "admin@acme.com" updated campaign "Summer Sale" status from Draft to Scheduled
System EventJob name, trigger type, execution result, durationScheduled job "contact-sync" completed successfully in 12s
Webhook DeliveryEvent type, endpoint URL, payload, response status, retry countEvent "message.delivered" sent to https://acme.com/webhooks, received 200 on first attempt

Steps

1. Open Activity Logs

Navigate to Account > Logs in the sidebar. The default view shows the most recent events in reverse chronological order. Each row displays a timestamp, event type icon, actor (user email or "System"), the affected module, and a one-line summary of the event.

Log feed default view with reverse-chronological list showing timestamp, type, actor, and summary columns

2. Filter logs

Use the filter bar at the top to narrow results. Available filters include date range, actor (specific user or system), event type (API call, user action, system event, webhook delivery), module (campaigns, contacts, inbox, channels, settings), and outcome (success or failure). Combining multiple filters lets you zero in on exactly the events you need.

Filtered log view with filters applied for specific date range and action type

3. View log details

Click any log entry to expand its detail panel. The detail view varies by event type. For API calls, you see the full HTTP method, URL, request headers, request body, response status code, and response body. For user actions, you see the before and after state of the changed resource. For webhook deliveries, you see the event payload, endpoint URL, response status, and retry history.

API call log detail showing HTTP method, URL, and request/response body
Webhook delivery log detail showing event type, endpoint URL, response status, and retries

4. Stream logs in real time

Click the Live toggle at the top of the log feed to activate real-time streaming. New events appear as they happen, with the feed auto-scrolling to the latest entry. This is particularly useful during campaign launches, load tests, or incident response when you need to observe system behavior as it unfolds. Click the toggle again to pause streaming and review specific entries.

Real-time streaming mode with Live toggle active and new events appearing

5. Export logs

Click Export above the log feed. Select the date range, apply any filters you want to carry over, and choose your format: CSV for spreadsheet analysis or JSON for programmatic processing. The export includes every field visible in the detail view, making the output suitable for compliance submissions, security audits, or import into external SIEM tools.

Export dialog with date range, filters, and format options

6. Review log retention policy

Open Settings > Log Retention to see how long logs are stored for your current plan. Plan your export schedule based on these retention windows to ensure you capture all logs you need before they are automatically purged.

PlanRetention period
Starter30 days
Growth90 days
Enterprise1 year

Common pitfalls

PitfallHow to avoid it
Not filtering before searchingLog volume in an active workspace can be enormous. Always apply date range and event type filters first to narrow results before scanning for a specific event.
Ignoring webhook delivery failuresFailed webhook deliveries mean your external systems are not receiving critical event data. Check webhook logs regularly and set up alerts for repeated delivery failures.
Assuming logs are retained foreverEach plan has a defined retention period. If you need logs for long-term compliance, set up a recurring export schedule before logs are purged.
Overlooking system events during investigationsWhen tracing an issue, teams often filter only for user actions. System events (automated workflows, scheduled jobs) are frequently the actual root cause. Always include them in your investigation filters.
Sharing raw exports without redactionAPI call logs may contain sensitive data such as API keys in headers or PII in request bodies. Redact sensitive fields before sharing exports with external parties or auditors.
tip

Bookmark filtered log views for your most common investigation patterns. For example, save a filter for "API calls with status 500 in the last 24 hours" or "webhook deliveries with failure status." This saves significant time when you need to troubleshoot quickly during an incident.

  • Activity Logs Overview
  • Log Filters
  • Log Details
  • Live Stream
  • Export Logs
  • Log Retention