Get audit log entries for an Account
Fetch audit logs with some filtering capabilities via query params
Path parameters
account_id
Query parameters
filters[start_date]
Start ISO Date
filters[end_date]
End ISO Date
filters[resource_type]
Filter by Resource Type
filters[event_type]
Filter by Type of Activity
filters[team_id]
Filter by Team ID
filters[project_id]
Filter by Project ID
filters[resource_id]
Filter by resource ID (Asset ID, Project ID, User ID)
filters[user_id]
Filter by User ID
filters[ip_address]
Filter by IP Address
This supports both IPv4 (1.1.1.1
) and IPv6 (2001:db8:3333:4444:5555:6666:7777:8888
)
page
Page number
page_size
Records per page
Response
Succesful Event logs response
account_id
anonymous_user_id
client
The API client the audit event was triggered by. This will not always be populated.
When the API call that produced an event was made via an OAuth app it will look like: `oauth_app/:uuid`, and if it was made via a developer token it will look like: `user_token/:uuid`, with the UUID being the User ID the token belongs to
Here are some examples:
- `user_token/57823879-e541-49b0-b902-c43794c4400c`
- `oauth_app/80ccf0bb-ae91-49c4-8aec-8f6238c14947`
- `web/2024-06-10-18-15`
- `pipeline-media-warden/cbd0061f6f190489e8af3137b8707b33f498f53f`
- `null`
event_type
event_details
The details for the event. This varies quite a bit from one type of event to another but there are some examples in the example responses.
id
Unique identifier
inserted_at
ip_address
The IP address associated with this event
project_id
The Project ID that this action occured in
resource_id
The ID of the referenced resource
resource_type
The type of the referenced resource
team_id
Team ID
source
The Source of the action that produced a given audit log entry
Allowed values:
user_id
User ID
updated_at