# Audit Log Administrators can view the Console audit log to see user activity in the Console. Information gathered includes: the event timestamp, the user’s email address, the user’s assigned role, and a description of the activity (examples: Logged in, Created model, Updated user). Admin Audit Log 1. Select a start date and end date to display audit log activity that occurred within the selected dates. 2. Select a role to display audit log activity based on a user’s assigned role. 3. Use the search field to display audit log activity based on the user’s email address. Email Search You must enter the full username in the email address. If the user’s email address is `username@email.com`, then use username to search by the email address. Data Retention Audit log entries are retained for 365 days. ## Audit Log Descriptions The following are audit log description categories and the associated log entries. | Category | Log Entry | | --- | --- | | API Key Management | Created API keyDeleted API keyExpired API keyCredential name | | Azure ML Integration | Created Azure ML configurationDeleted Azure ML configurationUpdated Azure ML configuration | | Databricks Integration | Created Databricks configurationDeleted Databricks configurationUpdated Databricks configuration | | EULA | Submitted EULA response | | Incident | Updated incident | | Model | Completed model uploadCreated modelDeleted modelModel nameModel IDStarted model uploadUpdated model | | Sentinel Integration | Created Sentinel configurationDeleted Sentinel configurationUpdated Sentinel configuration | | Splunk Integration | Created Splunk configurationDeleted Splunk configurationUpdated Splunk configuration | | SSO Integration | Created SSO configurationDeleted SSO configurationUpdated SSO configuration | | User | Created userDeleted userLogged inUser reset passwordUpdated user | | Webhook Integration | Created custom webhookDeleted custom webhookUpdated custom webhook |