Baseten records administrative and configuration events to an audit log. Organization Admins can review the log directly in the Baseten dashboard, and security-conscious organizations can stream audit events to an external SIEM through WorkOS.Documentation Index
Fetch the complete documentation index at: https://docs.baseten.co/llms.txt
Use this file to discover all available pages before exploring further.
Activity log in the dashboard
Every Baseten organization has an activity log that captures configuration changes and lifecycle events for models, Chains, secrets, API keys, environments, and users. To view the activity log, navigate to Organization settings and select the Activity tab. Each entry includes:- A description of the action and the user who performed it. System-initiated events, such as a deployment deactivated for inactivity, have no user attribution.
- The affected resource (model, Chain, environment, or other entity).
- The timestamp of the event.
If your organization uses teams, only Organization Admins can view the activity log. Members don’t see activity log entries in multi-team organizations.
Audit log event types
Each audit log entry has an event type. Event types appear as theaction field in exported events. In the dashboard, Baseten renders each event type as a human-readable description.
Models and deployments
MODEL_DEPLOYEDMODEL_DEPLOYMENT_ACTIVATEDMODEL_DEPLOYMENT_DEACTIVATEDMODEL_DEPLOYMENT_RETRIEDMODEL_DEPLOYMENT_PROMOTEDMODEL_DEPLOYMENT_AUTOSCALING_SETTINGS_CHANGEDMODEL_DEPLOYMENT_INSTANCE_TYPE_CHANGEDMODEL_DEPLOYMENT_DELETEDMODEL_DELETEDMODEL_PROMOTION_CONTROL_ACTIONREPLICA_TERMINATED
Chains
CHAIN_DEPLOYEDCHAIN_DEPLOYMENT_ACTIVATEDCHAIN_DEPLOYMENT_DEACTIVATEDCHAIN_DEPLOYMENT_PROMOTEDCHAIN_DEPLOYMENT_DELETEDCHAIN_DELETEDCHAINLET_AUTOSCALING_SETTINGS_CHANGEDCHAINLET_INSTANCE_TYPE_CHANGED
Environments
ENVIRONMENT_CREATEDENVIRONMENT_UPDATEDENVIRONMENT_DELETED
Credentials and secrets
API_KEY_CREATEDAPI_KEY_DELETEDSECRET_UPDATEDSECRET_DELETEDWEBHOOK_SIGNING_SECRET_CREATEDWEBHOOK_SIGNING_SECRET_ROTATEDWEBHOOK_SIGNING_SECRET_DELETEDSSH_CERTIFICATE_SIGNED
Users
USER_INVITEDUSER_JOINED_ORGANIZATIONUSER_ROLE_UPDATEDUSER_REMOVED
Audit log export to your SIEM
For organizations that need audit events in an external system, Baseten can stream the audit log to WorkOS Audit Logs, which forwards events to destinations you control. Supported destinations include:- Amazon S3
- Datadog
- Splunk
Audit log export is available on the Enterprise plan. Contact support to enable export for your organization.
Enable audit log export
To enable audit log export:- Contact support with your organization name and the destination you want to forward events to.
- Baseten enables export and walks you through configuring your destination, including any destination-specific credentials or webhook URLs.
Event delivery
Baseten retries transient failures for up to 30 minutes when sending events to your destination. For details on destination-side retry and delivery guarantees, see the WorkOS Audit Logs documentation.Considerations
- The activity log in the dashboard always reflects every recorded event for your organization, regardless of export status.
- For details on audit log retention, contact support.
- If you need a custom event schema or a destination not supported by WorkOS, contact support.