What Gets Tracked
Every key verification generates analytics data:Verification events
Successful and failed verification attempts with timestamps and outcomes
Usage patterns
Request frequency, peak times, and traffic trends per key or identity
Rate limit violations
When keys hit rate limits and which limits are being exceeded
Credit consumption
Usage limit tracking — how many credits remain and when they’re depleted
Geographic distribution
Where requests are coming from globally (by region)
Error patterns
Failed verifications: expired keys, disabled keys, insufficient permissions
Dashboard Analytics
Access analytics through the Unkey dashboard:Navigate to Analytics
Sign into app.unkey.com and click Analytics in the sidebar
Available Views
- Overview
- Per-Key Analytics
- Per-Identity Analytics
- Errors & Failures
High-level metrics:
- Total verifications (successful + failed)
- Success rate percentage
- Active keys count
- Top consumers by volume
- Verification trends over time
Verification Logs
View detailed logs of every verification attempt:- Access Logs
- Log Retention
- Filtering Logs
- Go to Keys in the dashboard
- Click on any key
- Navigate to the Verifications tab
- Timestamp (with millisecond precision)
- Outcome (
VALID,RATE_LIMITED, etc.) - Request metadata (if provided during verification)
- Identity info (if key is linked)
- Rate limit state
- Credits consumed
Programmatic Analytics
Query analytics data programmatically via the Unkey API.The Analytics API is available on Pro and Enterprise plans. It requires a root key with
analytics.query permission.- Query Verifications
- Query by Key
- Time-Series Data
Common Analytics Queries
Identify top consumers
Identify top consumers
In the dashboard:
- Go to Analytics → Overview
- Check the Top Keys widget
- Sort by verification count
Monitor rate limit violations
Monitor rate limit violations
Track which keys are hitting limits:
- Go to Analytics → Errors
- Filter by code:
RATE_LIMITED - Identify patterns:
- Same key repeatedly hitting limits → User needs upgrade
- Sudden spike in violations → Possible abuse or bug
- Specific time of day → Workload scheduling issue
Track credit consumption
Track credit consumption
Monitor which keys are running out of credits:
Detect unusual patterns
Detect unusual patterns
Identify anomalies that might indicate compromise:
- Sudden spike in usage: Key making 10x normal requests
- New geographic locations: Key suddenly used from different continent
- Off-hours activity: Key active at unusual times
- High failure rate: Many
INSUFFICIENT_PERMISSIONSerrors (possible attack)
Calculate monthly usage for billing
Calculate monthly usage for billing
Generate usage-based invoices:
Custom Dashboards
Build custom analytics dashboards for your users:Alerting & Monitoring
Set up automated alerts for critical events:Credit depletion
Alert users when credits drop below threshold:
Rate limit violations
Notify when users consistently hit limits:
Unusual activity
Detect potential security issues:
Failed verifications
Track authentication failures:
Analytics Best Practices
Monitor key metrics daily
Monitor key metrics daily
Check these metrics every day:
- Total verifications: Are they growing?
- Success rate: Should be >99%
- Top consumers: Who are your power users?
- Error trends: Are failures increasing?
Set up automated reports
Set up automated reports
Generate weekly/monthly reports:
- Email stakeholders with usage summaries
- Track growth trends
- Identify opportunities for upsells
- Spot potential churn (declining usage)
Use metadata for segmentation
Use metadata for segmentation
Store context in key metadata for better analytics:Then segment analytics by industry, plan, etc.
Correlate with business metrics
Correlate with business metrics
Connect API usage to business outcomes:
- Do power users have higher retention?
- Does usage predict upsells?
- Which features drive the most API calls?
Set usage-based alerts
Set usage-based alerts
Automate responses to usage patterns:
- Low usage → Re-engagement email
- High usage → Upsell offer
- Depleted credits → Prompt to add more
- Rate limits hit → Upgrade prompt
Compliance & Data Privacy
Data retention: Analytics data is retained according to your plan. For GDPR/CCPA compliance, you can request deletion of specific key analytics.PII handling: Unkey does not capture request payloads or response bodies — only metadata. Never store PII in key names or metadata unless encrypted.
Next Steps
Audit Logs
Track who made changes to keys and configuration
Rate Limiting
Understand how rate limit analytics work
API Reference
Complete analytics API documentation
Webhooks
Receive real-time notifications for key events