What Gets Logged
NOFire AI logs actions that modify data or involve authentication:- Authentication: Login, logout, session events
- API keys: Creation and deletion (individual API calls using a key are not logged, but the actor is identified as the API key)
- Integrations: Connection creation, updates, removal (validation errors are logged, but explicit test actions are not)
- Investigations: Resolve, feedback, incident creation, postmortem generation
Audit Event Schema
Every audit event includes:| Field | Description |
|---|---|
time | When the action occurred (ISO 8601 UTC) |
actor_id | Who performed the action (email or API key ID) |
actor_type | Type of actor: user, api_key, or system |
action | What happened: create, write, delete, login, logout, etc. |
resource_type | What was affected: connections, investigations, api_keys, etc. |
resource_id | Unique identifier of the affected resource |
success | Whether the operation succeeded (true/false) |
ip_address | Source IP address |
user_agent | Browser or client identifier |
metadata | Additional context (request IDs, failure reasons, etc.) |
S3 Export
Automatically export your audit logs to your own S3 bucket for long-term retention and compliance archival.How It Works
- Configure S3 connection: Provide your bucket name and IAM role
- Daily exports: NOFire exports previous day’s logs every night
- Compressed format: Logs are gzipped JSONL (one JSON object per line)
- Organized structure: Files use Hive-style partitioning for easy querying
Export Path Format
IAM Role Setup
Grant NOFire cross-account access to write audit logs to your S3 bucket:Use the External ID provided in the NOFire AI dashboard when configuring your audit export connection.
Retention Policy
Audit logs are retained based on your plan:- In-platform access: 7 days (configurable up to 90 days)
- S3 exports: Indefinite (you control retention in your bucket)
Compliance tip: Configure S3 lifecycle policies to archive logs to Glacier for cost-effective long-term retention.
Use Cases
Compliance Audits
Access complete audit trail for compliance reviews:- All logs automatically exported to your S3 bucket
- Query with Athena:
SELECT * FROM audit_logs WHERE action = 'delete' - Industry-standard format works with any analytics tool
Security Investigations
Review historical activity during security incidents:- Who accessed what resources and when
- Failed login attempts and their sources
- Unauthorized access attempts
Access Reviews
Track API key usage and identify security risks:- When keys were created and by whom
- Last usage timestamps for each key
- Identify unused or overprivileged keys
Change Tracking
Maintain complete history of configuration changes:- Who modified integration settings
- When connections were added or removed
- Changes to user permissions and roles
Best Practices
Enable S3 export immediately: Don’t wait until you need historical logs for compliance or investigation. Configure S3 export on day one. Set up S3 lifecycle policies: Archive older logs to Glacier after 90 days for cost optimization while maintaining compliance. Query efficiently: Use narrow time ranges and resource filters to reduce query time and data transfer. Monitor export status: Set up alerts if export jobs fail for multiple consecutive days. Review regularly: Periodic access reviews help identify unused API keys, suspicious patterns, and compliance gaps.For questions about audit logging setup or S3 export configuration, contact [email protected].

