Know exactly who did what, and when, across your entire Dokploy organization.
Every create, update, delete, deployment, and configuration change is logged—giving you a reliable trail for security, compliance, and debugging.
Audit logs capture authentication events, user management changes, deployment activity, infrastructure updates, environment variable changes, backup configuration, and more. If it happened in Dokploy, it’s recorded.
Each log entry includes a timestamp, the user who performed the action, the action type, the resource affected, and the user’s role in Dokploy at the time. When something goes wrong, you have everything you need to trace it back to its source.
Search and filter audit logs by user, resource name, action type, or resource type so you can find the specific event you’re looking for without scrolling through unrelated activity.
Audit logs give you documented evidence of access control and change management, making it straightforward to satisfy requirements for SOC 2, GDPR, and internal security policies.
Dokploy scales with your team, with features and plans for when you're ready to take the next step.
Control who can perform the actions your audit logs record, with fine-grained permissions across projects and services.
Centralize authentication with your existing identity provider for secure, seamless access across your organization.
Present Dokploy as your own product, with custom branding for your clients or organization.
Talk to us about audit logs and the rest of Dokploy's higher-tier features.